| 2003 | (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. Mathieu Ciet, Marc Joye |
| 2003 | A Compound Intrusion Detection Model. Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han |
| 2003 | A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code. Pat Pik-Wah Chan, Michael R. Lyu |
| 2003 | A Fast Square Root Computation Using the Frobenius Mapping. Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa |
| 2003 | A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim |
| 2003 | A Functional Decomposition of Virus and Worm Programs. J. Krishna Murthy |
| 2003 | A Lattice Based General Blind Watermark Scheme. Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu |
| 2003 | A Novel Efficient Group Signature Scheme with Forward Security. Jianhong Zhang, Qianhong Wu, Yumin Wang |
| 2003 | A Novel Two-Level Trust Model for Grid. Tieyan Li, Huafei Zhu, Kwok-Yan Lam |
| 2003 | A Policy Based Framework for Access Control. Ricardo Nabhen, Edgard Jamhour, Carlos Maziero |
| 2003 | A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. Min Luo, Lina Wang, Huanguo Zhang, Jin Chen |
| 2003 | A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. Xiaodong Yi, Xuejun Yang |
| 2003 | A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. Yan Wang, Shuwang Lü, Zhenhua Liu |
| 2003 | A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. Taeshik Shon, Jung Taek Seo, Jongsub Moon |
| 2003 | Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. Yongdong Wu, Robert H. Deng |
| 2003 | An Efficient Convertible Authenticated Encryption Scheme and Its Variant. Hui-Feng Huang, Chin-Chen Chang |
| 2003 | An Efficient Known Plaintext Attack on FEA-M. Hongjun Wu, Feng Bao, Robert H. Deng |
| 2003 | An Efficient Public-Key Framework. Jianying Zhou, Feng Bao, Robert H. Deng |
| 2003 | An Optimized Multi-bits Blind Watermarking Scheme. Xiaoqiang Li, Xiangyang Xue, Wei Li |
| 2003 | Broadcast Encryption Schemes Based on the Sectioned Key Tree. Miodrag J. Mihaljevic |
| 2003 | Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. Yang Cui, Kazukuni Kobara, Hideki Imai |
| 2003 | ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma |
| 2003 | ID-Based Distributed "Magic Ink" Signature from Pairings. Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim |
| 2003 | Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Sihan Qing, Dieter Gollmann, Jianying Zhou |
| 2003 | Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. Mohsen Ashourian, Yo-Sung Ho |
| 2003 | On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei |
| 2003 | Practical Service Charge for P2P Content Distribution. Jose Antonio Onieva, Jianying Zhou, Javier López |
| 2003 | Practical t-out-n Oblivious Transfer and Its Applications. Qianhong Wu, Jianhong Zhang, Yumin Wang |
| 2003 | Protocols for Malicious Host Revocation. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
| 2003 | ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee |
| 2003 | Research on the Collusion Estimation. Gang Li, Jie Yang |
| 2003 | Role-Based Access Control and the Access Control Matrix. Gregory Saunders, Michael Hitchens, Vijay Varadharajan |
| 2003 | Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. Yan Wang, Chi-Hung Chi, Tieyan Li |
| 2003 | Security Remarks on a Group Signature Scheme with Member Deletion. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng |
| 2003 | Space-Economical Reassembly for Intrusion Detection System. Meng Zhang, Jiubin Ju |
| 2003 | Trading-Off Type-Inference Memory Complexity against Communication. Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine |
| 2003 | UC-RBAC: A Usage Constrained Role-Based Access Control Model. Zhen Xu, Dengguo Feng, Lan Li, Hua Chen |
| 2003 | Variations of Diffie-Hellman Problem. Feng Bao, Robert H. Deng, Huafei Zhu |