| 2004 | A New Key-Insulated Signature Scheme. Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio |
| 2004 | A Qualitative Evaluation of Security Patterns. Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides |
| 2004 | A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels |
| 2004 | A Semi-fragile Steganographic Digital Signature for Images. Luke Hebbes, Andrew P. Lenaghan |
| 2004 | Adaptive-CCA on OpenPGP Revisited. Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen |
| 2004 | An Efficient Authentication Scheme Using Recovery Information in Signature. Kihun Hong, Souhwan Jung |
| 2004 | Automatic Covert Channel Analysis of a Multilevel Secure Component. Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci |
| 2004 | Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. Slobodan Petrovic, Amparo Fúster-Sabater |
| 2004 | Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro |
| 2004 | Dynamic Access Control for Multi-privileged Group Communications. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li |
| 2004 | Factorization-Based Fail-Stop Signatures Revisited. Katja Schmidt-Samoa |
| 2004 | Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng |
| 2004 | Hydan: Hiding Information in Program Binaries. Rakan El-Khalil, Angelos D. Keromytis |
| 2004 | Identification of Traitors Using a Trellis. Marcel Fernandez, Miguel Soriano |
| 2004 | Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings Javier López, Sihan Qing, Eiji Okamoto |
| 2004 | Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth |
| 2004 | Modelling Dependencies Between Classifiers in Mobile Masquerader Detection. Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen |
| 2004 | Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai |
| 2004 | Multi-designated Verifiers Signatures. Fabien Laguillaumie, Damien Vergnaud |
| 2004 | New Identity-Based Ring Signature Schemes. Javier Herranz, Germán Sáez |
| 2004 | New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee |
| 2004 | On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. Bo-Yin Yang, Jiun-Ming Chen, Nicolas T. Courtois |
| 2004 | On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. Anton Kargl, Götz Wiesend |
| 2004 | On Some Weak Extensions of AES and BES. Jean Monnerat, Serge Vaudenay |
| 2004 | On the Minimal Assumptions of Group Signature Schemes. Michel Abdalla, Bogdan Warinschi |
| 2004 | On the Security of a Multi-party Certified Email Protocol. Jianying Zhou |
| 2004 | PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. Klaus Herrmann, Michael A. Jaeger |
| 2004 | Perfect Concurrent Signature Schemes. Willy Susilo, Yi Mu, Fangguo Zhang |
| 2004 | Provably Secure Authenticated Tree Based Group Key Agreement. Ratna Dutta, Rana Barua, Palash Sarkar |
| 2004 | Reflector Attack Traceback System with Pushback Based iTrace Mechanism. Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh |
| 2004 | Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. Habtamu Abie, Pål Spilling, Bent Foyn |
| 2004 | Robust Metering Schemes for General Access Structures. Ventzislav Nikov, Svetla Nikova, Bart Preneel |
| 2004 | Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
| 2004 | Secure Hierarchical Identity Based Signature and Its Application. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
| 2004 | Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). Tao Wan, Evangelos Kranakis, Paul C. van Oorschot |
| 2004 | Security Analysis of the Generalized Self-shrinking Generator. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao |
| 2004 | Sound Approximations to Diffie-Hellman Using Rewrite Rules. Christopher Lynch, Catherine Meadows |
| 2004 | Taxonomic Consideration to OAEP Variants and Their Security. Yuichi Komano, Kazuo Ohta |
| 2004 | Threat Analysis on NEtwork MObility (NEMO). Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, Hyungon Kim |
| 2004 | Time-Scoped Searching of Encrypted Audit Logs. Darren Davis, Fabian Monrose, Michael K. Reiter |
| 2004 | Transient Fault Induction Attacks on XTR. Mathieu Ciet, Christophe Giraud |
| 2004 | Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara |
| 2004 | Volatile Memory Computer Forensics to Detect Kernel Level Compromise. Sandra Ring, Eric Cole |