| 1992 | A Formal Framework for Authentication. Colin Boyd |
| 1992 | A Hardware Design Model for Cryptographic Algorithms. Joan Daemen, René Govaerts, Joos Vandewalle |
| 1992 | ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu |
| 1992 | An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. Jean-Charles Fabre, Brian Randell |
| 1992 | Associating Metrics to Certification Paths. Anas Tarah, Christian Huitema |
| 1992 | Breaking the Traditional Computer Security Barriers. Yvo Desmedt |
| 1992 | Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater |
| 1992 | Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. Jingsha He, Virgil D. Gligor |
| 1992 | Formal Specification of Security Requirements using the Theory of Normative Positions. Andrew J. I. Jones, Marek J. Sergot |
| 1992 | Freshness Assurance of Authentication Protocols. Kwok-Yan Lam, Dieter Gollmann |
| 1992 | GDoM: a Multilevel Document Manager. Christel Calas |
| 1992 | KryptoKnight Authentication and Key Distribution System. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti |
| 1992 | M Bruno d'Ausbourg, Jean-Henri Llareus |
| 1992 | On Transaction Processing for Multilevel Secure Replicated Databases. Iwen E. Kang, Thomas F. Keefe |
| 1992 | On the Chinese Wall Model. Volker Kessler |
| 1992 | Policy Enforcement in Stub Autonomous Domains. Gene Tsudik |
| 1992 | Polyinstantation for Cover Stories. Ravi S. Sandhu, Sushil Jajodia |
| 1992 | Security Constraint Processing in Multilevel Secure AMAC Schemata. Günther Pernul |
| 1992 | Separating the Specification and Implementation Phases in Cryptology. Marie-Jeanne Toussaint |
| 1992 | The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. Michael Wang, Andrzej M. Goscinski |
| 1992 | Timely Authentication in Distributed Systems. Kwok-Yan Lam, Thomas Beth |
| 1992 | Towards Security in an Open Systems Federation. John A. Bull, Li Gong, Karen R. Sollins |
| 1992 | Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. Udo Kelter |
| 1992 | UEPS - A Second Generation Electronic Wallet. Ross J. Anderson |
| 1992 | Verification and Modelling of Authentication Protocols. Ralf C. Hauser, E. Stewart Lee |