| 2007 | A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. Véronique Cortier, Ralf Küsters, Bogdan Warinschi |
| 2007 | A Logic for State-Modifying Authorization Policies. Moritz Y. Becker, Sebastian Nanz |
| 2007 | A Policy Language for Distributed Usage Control. Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter |
| 2007 | Adaptive Soundness of Static Equivalence. Steve Kremer, Laurent Mazaré |
| 2007 | Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. Kerstin Lemke-Rust, Christof Paar |
| 2007 | Change-Impact Analysis of Firewall Policies. Alex X. Liu |
| 2007 | Click Passwords Under Investigation. Krzysztof Golofit |
| 2007 | Cloak: A Ten-Fold Way for Reliable Covert Communications. Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
| 2007 | Completeness of the Authentication Tests. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer |
| 2007 | Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings Joachim Biskup, Javier López |
| 2007 | Conditional Privacy-Aware Role Based Access Control. Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo |
| 2007 | Countering Statistical Disclosure with Receiver-Bound Cover Traffic. Nayantara Mallesh, Matthew K. Wright |
| 2007 | Dynamic Information Flow Control Architecture for Web Applications. Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi |
| 2007 | Efficient Password-Based Authenticated Key Exchange Without Public Information. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu |
| 2007 | Efficient Proving for Practical Distributed Access-Control Systems. Lujo Bauer, Scott Garriss, Michael K. Reiter |
| 2007 | Encryption Techniques for Secure Database Outsourcing. Sergei Evdokimov, Oliver Günther |
| 2007 | Extending the Common Services of eduGAIN with a Credential Conversion Service. Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta |
| 2007 | Fragmentation and Encryption to Enforce Privacy in Data Storage. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
| 2007 | Generalized Key Delegation for Hierarchical Identity-Based Encryption. Michel Abdalla, Eike Kiltz, Gregory Neven |
| 2007 | Graphical Password Authentication Using Cued Click Points. Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
| 2007 | Improved Anonymous Timed-Release Encryption. Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides |
| 2007 | Incorporating Temporal Capabilities in Existing Key Management Schemes. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
| 2007 | Inductive Proofs of Computational Secrecy. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell |
| 2007 | Information Confinement, Privacy, and Security in RFID Systems. Roberto Di Pietro, Refik Molva |
| 2007 | Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. André Adelsbach, Ulrich Greveler |
| 2007 | Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. Paul Z. Kolano |
| 2007 | Modular Access Control Via Strategic Rewriting. Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira |
| 2007 | Obligations and Their Interaction with Programs. Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi |
| 2007 | On the Automated Correction of Security Protocols Susceptible to a Replay Attack. Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter |
| 2007 | On the Privacy of Concealed Data Aggregation. Aldar C.-F. Chan, Claude Castelluccia |
| 2007 | Pragmatic XML Access Control Using Off-the-Shelf RDBMS. Bo Luo, Dongwon Lee, Peng Liu |
| 2007 | Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. Hongxia Jin, Jeffery Lotspiech |
| 2007 | Satisfiability and Resiliency in Workflow Systems. Qihua Wang, Ninghui Li |
| 2007 | Security Evaluation of Scenarios Based on the TCG's TPM Specification. Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
| 2007 | Security of Multithreaded Programs by Compilation. Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld |
| 2007 | SilentKnock: Practical, Provably Undetectable Authentication. Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra |
| 2007 | Synthesizing Secure Protocols. Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu |
| 2007 | Towards Modeling Trust Based Decisions: A Game Theoretic Approach. Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya |
| 2007 | Traceability and Integrity of Execution in Distributed Workflow Management Systems. Frederic Montagut, Refik Molva |
| 2007 | Trustworthy Services and the Biological Analogy. Michael K. Reiter |
| 2007 | What, Indeed, Is Intransitive Noninterference? Ron van der Meyden |