| 2002 | A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. Giles Hogben, Tom Jackson, Marc Wilikens |
| 2002 | Analysing a Stream Authentication Protocol Using Model Checking. Philippa J. Broadfoot, Gavin Lowe |
| 2002 | Authentication for Distributed Web Caches. James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari |
| 2002 | Bit-Slice Auction Circuit. Kaoru Kurosawa, Wakaha Ogata |
| 2002 | Cardinality-Based Inference Control in Sum-Only Data Cubes. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia |
| 2002 | Computational Probabilistic Non-interference. Michael Backes, Birgit Pfitzmann |
| 2002 | Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Dieter Gollmann, Günter Karjoth, Michael Waidner |
| 2002 | Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. Joachim Biskup, Piero A. Bonatti |
| 2002 | Confidentiality-Preserving Refinement is Compositional - Sometimes. Thomas Santen, Maritta Heisel, Andreas Pfitzmann |
| 2002 | Decidability of Safety in Graph-Based Models for Access Control. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
| 2002 | Equal To The Task? James Heather, Steve A. Schneider |
| 2002 | Formal Security Analysis with Interacting State Machines. David von Oheimb, Volkmar Lotz |
| 2002 | Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. Marcin Gomulkiewicz, Miroslaw Kutylowski |
| 2002 | Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu |
| 2002 | Learning Fingerprints for a Database Intrusion Detection System. Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong |
| 2002 | Outbound Authentication for Programmable Secure Coprocessors. Sean W. Smith |
| 2002 | TINMAN: A Resource Bound Security Checking System for Mobile Code. Aloysius K. Mok, Weijiang Yu |