| 2005 | A Generic XACML Based Declarative Authorization Scheme for Java. Rajeev Gupta, Manish Bhide |
| 2005 | A Practical Voter-Verifiable Election Scheme. David Chaum, Peter Y. A. Ryan, Steve A. Schneider |
| 2005 | Abstractions Preserving Parameter Confidentiality. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
| 2005 | An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. Lingyu Wang, Anyi Liu, Sushil Jajodia |
| 2005 | Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. Huafei Zhu, Feng Bao |
| 2005 | Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. Felix C. Freiling, Thorsten Holz, Georg Wicherski |
| 2005 | Browser Model for Security Analysis of Browser-Based Protocols. Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi |
| 2005 | Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann |
| 2005 | Computerized Voting Machines: A View from the Trenches. Barbara Simons |
| 2005 | Enforcing Non-safety Security Policies with Program Monitors. Jay Ligatti, Lujo Bauer, David Walker |
| 2005 | Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. Michael Backes, Birgit Pfitzmann |
| 2005 | Local View Attack on Anonymous Communication. Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski |
| 2005 | Machine-Checked Security Proofs of Cryptographic Signature Schemes. Sabrina Tarento |
| 2005 | Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. Fabio Massacci, John Mylopoulos, Nicola Zannone |
| 2005 | On Obligations. Manuel Hilty, David A. Basin, Alexander Pretschner |
| 2005 | On Scalability and Modularisation in the Modelling of Network Security Systems. João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus |
| 2005 | Privacy Preserving Clustering. Somesh Jha, Louis Kruger, Patrick D. McDaniel |
| 2005 | Quantifying Probabilistic Information Flow in Computational Reactive Systems. Michael Backes |
| 2005 | Sanitizable Signatures. Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik |
| 2005 | Security Notions for Disk Encryption. Kristian Gjøsteen |
| 2005 | Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. Aslan Askarov, Andrei Sabelfeld |
| 2005 | Semantic Access Control Model: A Formal Specification. Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana |
| 2005 | Soundness of Formal Encryption in the Presence of Key-Cycles. Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov |
| 2005 | Specification and Validation of Authorisation Constraints Using UML and OCL. Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge |
| 2005 | Sybil-Resistant DHT Routing. George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson |
| 2005 | Towards a Theory of Intrusion Detection. Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade |
| 2005 | Unified Index for Mobile Object Data and Authorizations. Vijayalakshmi Atluri, Qi Guo |
| 2005 | Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. Indrajit Ray, Nayot Poolsapassit |
| 2005 | XML Access Control with Policy Matching Tree. Naizhen Qi, Michiharu Kudo |