| 2003 | A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. David von Oheimb, Georg Walter, Volkmar Lotz |
| 2003 | A Toolkit for Managing Enterprise Privacy Policies. Michael Backes, Birgit Pfitzmann, Matthias Schunter |
| 2003 | An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. Jacob Zimmermann, Ludovic Mé, Christophe Bidan |
| 2003 | An On-the-Fly Model-Checker for Security Protocol Analysis. David A. Basin, Sebastian Mödersheim, Luca Viganò |
| 2003 | Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll |
| 2003 | Authorization and Access Control in Adaptive Workflows. Dulce Domingos, António Rito Silva, Pedro Veiga |
| 2003 | Bridging Model-Based and Language-Based Security. Rogardt Heldal, Fredrik Hultin |
| 2003 | Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings Einar Snekkenes, Dieter Gollmann |
| 2003 | Flexible Regulation of Distributed Coalitions. Xuhui Ao, Naftaly H. Minsky |
| 2003 | Hardware Encapsulation of Security Services. Adrian Baldwin, Simon Shiu |
| 2003 | Initiator-Resilient Universally Composable Key Exchange. Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt |
| 2003 | Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. Yuji Watanabe, Masayuki Numao |
| 2003 | On the Detection of Anomalous System Call Arguments. Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna |
| 2003 | Passive Attack Analysis for Connection-Based Anonymity Systems. Andrei Serjantov, Peter Sewell |
| 2003 | Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia |
| 2003 | Rapid Mixing and Security of Chaum's Visual Electronic Voting. Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski |
| 2003 | Signature and Access Control Policies for XML Documents. Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza |
| 2003 | Symmetric Authentication within a Simulatable Cryptographic Library. Michael Backes, Birgit Pfitzmann, Michael Waidner |
| 2003 | Towards Accountable Management of Privacy and Identity Information. Marco Casassa Mont, Siani Pearson, Pete Bramhall |
| 2003 | Visualisation for Intrusion Detection. Stefan Axelsson |