| 2001 | A Cyclic Window Algorithm for ECC Defined over Extension Fields. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi |
| 2001 | A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce. Kanta Matsuura |
| 2001 | A Digital Nominative Proxy Signature Scheme for Mobile Communication. Hee-Un Park, Im-Yeong Lee |
| 2001 | A New Approach for Secure Multicast Routing in a Large Scale Network. Young-Chul Shim |
| 2001 | A New Semantics of Authentication Logic. Yifa Li |
| 2001 | A Novel Data Hiding Method for Two-Color Images. Gang Pan, Yijun Wu, Zhaohui Wu |
| 2001 | A Public Key Cryptosystem Based on the Subgroup Membership Problem. Juan Manuel González Nieto, Colin Boyd, Ed Dawson |
| 2001 | A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. Dianlong Zhang, Harald Lukhaub, Werner Zorn |
| 2001 | A Role-Based Model for Access Control in Database Federations. Eric Disson, Danielle Boulanger, Gilles Dubois |
| 2001 | A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim |
| 2001 | A Unified Methodology for Verification and Synthesis of Firewall Configurations. Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas |
| 2001 | A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls. Hongpei Li, Lianli Chang, Xinmei Wang |
| 2001 | AMBAR Protocol: Access Management Based on Authorization Reduction. Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
| 2001 | An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue |
| 2001 | An Identification Scheme Provably Secure against Reset Attack. Chan H. Lee, Xiaotie Deng, Huafei Zhu |
| 2001 | An Intelligent Intruder Model for Security Protocol Analysis. Dongxi Liu, Xiaoyong Li, Yingcai Bai |
| 2001 | Applying NCP Logic to the Analysis of SSL 3.0. Zhimin Song, Sihan Qing |
| 2001 | Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou |
| 2001 | Cheating Immune Secret Sharing. Xian-Mo Zhang, Josef Pieprzyk |
| 2001 | Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras |
| 2001 | Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes. Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao |
| 2001 | Cryptanalysis of the Improved User Efficient Blind Signatures. Chin-Chen Chang, Iuon-Chang Lin |
| 2001 | Cryptography and Middleware Security. Ulrich Lang, Dieter Gollmann, Rudolf Schreiner |
| 2001 | Dealing with Uncertainties in Risk Analysis Using Belief Functions. Sungbaek Cho, Zbigniew Ciechanowicz |
| 2001 | Defeating Denial-of-Service Attacks on the Internet. Baoqing Ye |
| 2001 | Dispatching Mobile Agents with Secure Routes in Parallel. Yan Wang, Kian-Lee Tan |
| 2001 | Efficient Software Implementation for Finite Field Multiplication in Normal Basis. Peng Ning, Yiqun Lisa Yin |
| 2001 | Encryption Sticks (Randomats). Gideon Samid |
| 2001 | Enforcing Obligation with Security Monitors. Carlos Ribeiro, Andre Zuquete, Paulo Ferreira |
| 2001 | Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions. Jie-lü Xu, Hanliang Xu, Yan Wang, Shuwang Lü |
| 2001 | Estimating the Scalability of the Internet Key Exchange. Sanna Kunnari |
| 2001 | Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain. Xiaochen Bo, Lincheng Shen, Wensen Chang |
| 2001 | Fair Electronic Cash Based on a Group Signature Scheme. Greg Maitland, Colin Boyd |
| 2001 | Fair Exchange of Digital Signatures with Offline Trusted Third Party. Chuan-Kun Wu, Vijay Varadharajan |
| 2001 | Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. Fangguo Zhang, Futai Zhang, Yumin Wang |
| 2001 | Generalization of Elliptic Curve Digital Signature Schemes. Lin You, Yixian Yang, Chun Qi Zhang |
| 2001 | Hierarchical Simulation Model with Animation for Large Network Security. Mi Ra Yi, Tae Ho Cho |
| 2001 | Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 Sihan Qing, Tatsuaki Okamoto, Jianying Zhou |
| 2001 | NIDS Research Based on Artificial Immunology. Wenjian Luo, Xianbin Cao, Xufa Wang |
| 2001 | On a Network Security Model for the Secure Information Flow on Multilevel Secure Network. Ki-Yoong Hong, Chul Kim |
| 2001 | Performance of WTLS and Its Impact on an M-commerce Transaction. Ian Herwono, Ingo Liebhardt |
| 2001 | Playing Lottery on the Internet. Jianying Zhou, Chunfu Tan |
| 2001 | Primitive Polynomials over GF(2) - A Cryptologic Approach. Kishan Chand Gupta, Subhamoy Maitra |
| 2001 | Privacy Protection for Transactions of Digital Goods. Feng Bao, Robert H. Deng |
| 2001 | Quantifying Network Denial of Service: A Location Service Case Study. Yan Chen, Adam W. Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz |
| 2001 | RBAC for XML Document Stores. Michael Hitchens, Vijay Varadharajan |
| 2001 | Reasoning about Accountability within Delegation. Bruno Crispo, Giancarlo Ruffo |
| 2001 | Redundancy, Obscurity, Self-Containment & Independence. Seenil Gram |
| 2001 | Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles. Ji-Hwan Park, Sook Ee Jeong, Chang Soo Kim |
| 2001 | SECUSIM: A Tool for the Cyber-Attack Simulation. Jong Sou Park, Jang-Se Lee, Hwankuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi |
| 2001 | Security of Blind Discrete Log Signatures against Interactive Attacks. Claus-Peter Schnorr |
| 2001 | Square Attack on Reduced Camellia Cipher. Yeping He, Sihan Qing |
| 2001 | TH-SMS: Security Management System in Advanced Computational Infrastructure. Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang, Sanli Li |
| 2001 | Threshold Undeniable RSA Signature Scheme. Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou |
| 2001 | Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. Chin-Chen Chang, Kuo-Feng Hwang |
| 2001 | Two Simple Batch Verifying Multiple Digital Signatures. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang |
| 2001 | Unconditionally-Secure Oblivious Transfer. Bo Yang, Shixiong Zhu, Yumin Wang |