| 2002 | A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim |
| 2002 | A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. Hai Jin, Feng Xian, Zongfen Han, Shengli Li |
| 2002 | A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. Tatsuyuki Matsushita |
| 2002 | A Group Signature Scheme Committing the Group. Toru Nakanishi, Masayuki Tao, Yuji Sugiyama |
| 2002 | A New Statistical Testing for Symmetric Ciphers and Hash Functions. Eric Filiol |
| 2002 | A Robust Block Oriented Watermarking Scheme in Spatial Domain. Tanmoy Kanti Das, Subhamoy Maitra |
| 2002 | A Secure Agent-Mediated Payment Protocol. Xiaolin Pang, Kian-Lee Tan, Yan Wang, Jian Ren |
| 2002 | A Secure Object Sharing Scheme for Java Card. Junqi Zhang, Vijay Varadharajan, Yi Mu |
| 2002 | A Specification Language for Distributed Policy Control. Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki |
| 2002 | A Synthetic Fraud Data Generation Methodology. Emilie Lundin, Håkan Kvarnström, Erland Jonsson |
| 2002 | Access Control Infrastructure for Digital Objects. Javier López, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle |
| 2002 | An Evaluation of Different IP Traceback Approaches. Vadim Kuznetsov, Helena Sandström, Andrei Simkin |
| 2002 | An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. Hajime Watanabe, Takashi Kitagawa |
| 2002 | Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. Myungsun Kim, Jongseong Kim, Kwangjo Kim |
| 2002 | Attacking Predictable IPsec ESP Initialization Vectors. Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen |
| 2002 | Cellular Automata Based Cryptosystem (CAC). Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri |
| 2002 | Cryptanalysis of the Reduced-Round RC6. Atsuko Miyaji, Masao Nonaka |
| 2002 | Defenses against the Truncation of Computation Results of Free-Roaming Agents. Jeff S. L. Cheng, Victor K. Wei |
| 2002 | Distributed Key Generation as a Component of an Integrated Protocol. Cheng-Kang Chu, Wen-Guey Tzeng |
| 2002 | Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. Changwoo Pyo, Gyungho Lee |
| 2002 | Fast Elliptic Curve Multiplications with SIMD Operations. Tetsuya Izu, Tsuyoshi Takagi |
| 2002 | Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). Ayineedi Venkateswarlu, Subhamoy Maitra |
| 2002 | IDS Interoperability and Correlation Using IDMEF and Commodity Systems. Nathan Carey, Andrew J. Clark, George M. Mohay |
| 2002 | Ideal Threshold Schemes from Orthogonal Arrays. Josef Pieprzyk, Xian-Mo Zhang |
| 2002 | Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou |
| 2002 | Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim |
| 2002 | Low Complexity Bit Serial Systolic Multipliers over GF(2 Soonhak Kwon |
| 2002 | Message Authentication Codes with Error Correcting Capabilities. Charles C. Y. Lam, Guang Gong, Scott A. Vanstone |
| 2002 | New Weak-Key Classes of IDEA. Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
| 2002 | Password-Authenticated Key Exchange between Clients with Different Passwords. Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park |
| 2002 | Reducing the Memory Complexity of Type-Inference Algorithms. David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina |
| 2002 | Related-Cipher Attacks. Hongjun Wu |
| 2002 | Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. Soichi Furuya, Kouichi Sakurai |
| 2002 | Robust Key-Evolving Public Key Encryption Schemes. Wen-Guey Tzeng, Zhi-Jia Tzeng |
| 2002 | Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan |
| 2002 | Security against Inference Attacks on Negative Information in Object-Oriented Databases. Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara |
| 2002 | Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties. Alexander Kholosha, Henk C. A. van Tilborg |
| 2002 | The Consistency of an Access Control List. Shoupeng Li, Shizhong Wu, Tao Guo |
| 2002 | The Risks of Compromising Secret Information. Kyungah Shim |
| 2002 | Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
| 2002 | User Interaction Design for Secure Systems. Ka-Ping Yee |
| 2002 | Using Independent Auditors as Intrusion Detection Systems. Jesus Molina, William A. Arbaugh |