| 2005 | A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. Song Huang, Ling Zhang, Shouling Dong |
| 2005 | Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. Lucas Ballard, Seny Kamara, Fabian Monrose |
| 2005 | Admissible Interference by Typing for Cryptographic Protocols. Alaaeddine Fellah, John Mullins |
| 2005 | An Evenhanded Certified Email System for Contract Signing. Kenji Imamoto, Jianying Zhou, Kouichi Sakurai |
| 2005 | Asymmetric Concurrent Signatures. Khanh Nguyen |
| 2005 | Authenticating Query Results in Data Publishing. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou |
| 2005 | Batching SSL/TLS Handshake Improved. Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu |
| 2005 | Ciphertext Comparison, a New Solution to the Millionaire Problem. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee |
| 2005 | Cryptanalysis of PASS II and MiniPass. Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi |
| 2005 | Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. Eun-Jun Yoon, Kee-Young Yoo |
| 2005 | Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. Shuhong Wang, Feng Bao, Robert H. Deng |
| 2005 | D_DIPS: An Intrusion Prevention System for Database Security. Jiazhu Dai, Huaikou Miao |
| 2005 | Efficient ID-Based Optimistic Fair Exchange with Provable Security. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou |
| 2005 | Efficient and Non-interactive Timed-Release Encryption. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater |
| 2005 | Enforce Mandatory Access Control Policy on XML Documents. Lan Li, Xinghao Jiang, Jianhua Li |
| 2005 | Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. Sangjin Kim, Hoonjung Lee, Heekuck Oh |
| 2005 | Generic Construction of (Identity-Based) Perfect Concurrent Signatures. Sherman S. M. Chow, Willy Susilo |
| 2005 | Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai |
| 2005 | Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi |
| 2005 | Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings Sihan Qing, Wenbo Mao, Javier López, Guilin Wang |
| 2005 | Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. Tieyan Li, Huafei Zhu, Yongdong Wu |
| 2005 | Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. Wei Wei, Xuhua Ding, Kefei Chen |
| 2005 | Network Access Control for Mobile Ad-Hoc Networks. Pan Wang, Peng Ning, Douglas S. Reeves |
| 2005 | Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian |
| 2005 | On Delegatability of Four Designated Verifier Signatures. Yong Li, Helger Lipmaa, Dingyi Pei |
| 2005 | On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti |
| 2005 | On the Security Bounds of CMC, EME, EME Raphael Chung-Wei Phan, Bok-Min Goi |
| 2005 | On the Security of Encryption Modes of MD4, MD5 and HAVAL. Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee |
| 2005 | PCAV: Internet Attack Visualization on Parallel Coordinates. Hyunsang Choi, Heejo Lee |
| 2005 | PIATS: A Partially Sanitizable Signature Scheme. Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka |
| 2005 | Port Scan Behavior Diagnosis by Clustering. Lanjia Wang, Hai-Xin Duan, Xing Li |
| 2005 | Private Itemset Support Counting. Sven Laur, Helger Lipmaa, Taneli Mielikäinen |
| 2005 | Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis |
| 2005 | Reversible Watermark with Large Capacity Using the Predictive Coding. Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka |
| 2005 | Secure Multicast Using Proxy Encryption. Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang |
| 2005 | Security Properties of Two Authenticated Conference Key Agreement Protocols. Qiang Tang, Chris J. Mitchell |
| 2005 | Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. Huafei Zhu, Feng Bao, Robert H. Deng |
| 2005 | Session Table Architecture for Defending SYN Flood Attack. Xin Li, Zhenzhou Ji, Mingzeng Hu |
| 2005 | Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. Yasuyuki Sakai, Kouichi Sakurai |
| 2005 | Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón |
| 2005 | Visual Cryptographic Protocols Using the Trusted Initializer. Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka |