| 1994 | A Calculus for Secure Channel Establishment in Open Networks. Ueli M. Maurer, Pierre E. Schmid |
| 1994 | A Consideration of the Modes of Operation for Secure Systems. C. L. Robinson, Simon R. Wiseman |
| 1994 | A Secure Medium Access Control Protocol: Security vs Performances. Pierre Siron, Bruno d'Ausbourg |
| 1994 | Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. Amihai Motro, Donald G. Marks, Sushil Jajodia |
| 1994 | An Efficient Electronic Payment System Protecting Privacy. Jan Camenisch, Jean-Marc Piveteau, Markus Stadler |
| 1994 | Authentication via Multi-Service Tickets in the Kuperee Server. Thomas Hardjono, Jennifer Seberry |
| 1994 | Beacon Based Authentication. Azad Jiwa, Jennifer Seberry, Yuliang Zheng |
| 1994 | Compile-Time Detection of Information Flow in Sequential Programs. Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer |
| 1994 | Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings Dieter Gollmann |
| 1994 | Decomposition of Multilevel Objects in an Object-Oriented Database. Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian |
| 1994 | Designing Secure Key Exchange Protocols. Colin Boyd, Wenbo Mao |
| 1994 | Distributed File System over a Multilevel Secure Architecture - Problems and Solutions. Christel Calas |
| 1994 | Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. Bruno d'Ausbourg |
| 1994 | Information Flow Controls vs Interference Controls: An Integrated Approach. Frédéric Cuppens, Gilles Trouessin |
| 1994 | Liability and Computer Security: Nine Principles. Ross J. Anderson |
| 1994 | Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini |
| 1994 | Non-Interference Through Determinism. A. W. Roscoe, Jim Woodcock, Lars Wulf |
| 1994 | Oblivious Signatures. Lidong Chen |
| 1994 | On Strengthening Authentication Protocols to Foil Cryptanalysis. Wenbo Mao, Colin Boyd |
| 1994 | On the Expressive Power of the Unary Transformation Model. Ravi S. Sandhu, Srinivas Ganta |
| 1994 | Privilege Graph: an Extension to the Typed Access Matrix Model. Marc Dacier, Yves Deswarte |
| 1994 | Robust and Secure Password and Key Change Method. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen |
| 1994 | Security Through Type Analysis. Colin O'Halloran, Chris T. Sennett |
| 1994 | Security Versus Performance Requirements in Data Communications Systems. Vasilios Zorkadis |
| 1994 | Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. Roshan K. Thomas, Ravi S. Sandhu |
| 1994 | The ESPRIT Project CAFE - High Security Digital Payment Systems. Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner |
| 1994 | Valuation of Trust in Open Networks. Thomas Beth, Malte Borcherding, Birgit Klein |