| 2008 | Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings Sihan Qing, Hideki Imai, Guilin Wang |
| 2007 | (Convertible) Undeniable Signatures Without Random Oracles. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo |
| 2007 | A Framework for Game-Based Security Proofs. David Nowak |
| 2007 | A New Dynamic Accumulator for Batch Updates. Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
| 2007 | A Novel Approach for Untrusted Code Execution. Yan Wen, Jinjing Zhao, Huaimin Wang |
| 2007 | A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction. B. John Oommen, Ebaa Fayyoumi |
| 2007 | A Semi-blind Watermarking Based on Discrete Wavelet Transform. Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu |
| 2007 | A System Architecture for History-Based Access Control for XML Documents. Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia Eckert |
| 2007 | An Efficient Password-Only Two-Server Authenticated Key Exchange System. Haimin Jin, Duncan S. Wong, Yinlong Xu |
| 2007 | Application of the PageRank Algorithm to Alarm Graphs. James J. Treinen, Ramakrishna Thurimella |
| 2007 | Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. Jiqiang Lu |
| 2007 | Audio Watermarking Algorithm Based on Centroid and Statistical Features. Xiaoming Zhang, Xiong Yin |
| 2007 | Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis |
| 2007 | BIOS Security Analysis and a Kind of Trusted BIOS. Zhenliu Zhou, Rongsheng Xu |
| 2007 | Boudot's Range-Bounded Commitment Scheme Revisited. Zhengjun Cao, Lihua Liu |
| 2007 | Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou |
| 2007 | Compact and Secure Design of Masked AES S-Box. Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani |
| 2007 | DDoS Attack Detection Algorithms Based on Entropy Computing. Liying Li, Jianying Zhou, Ning Xiao |
| 2007 | Detection and Diagnosis of Control Interception. Chang-Hsien Tsai, Shih-Kun Huang |
| 2007 | Differential Fault Analysis on CLEFIA. Hua Chen, Wenling Wu, Dengguo Feng |
| 2007 | Drive-By Pharming. Sid Stamm, Zulfikar Ramzan, Markus Jakobsson |
| 2007 | Extending FORK-256 Attack to the Full Hash Function. Scott Contini, Krystian Matusiewicz, Josef Pieprzyk |
| 2007 | Firewall for Dynamic IP Address in Mobile IPv6. Ying Qiu, Feng Bao, Jianying Zhou |
| 2007 | Formal Definition and Construction of Nominative Signature. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo |
| 2007 | High Speed Modular Divider Based on GCD Algorithm. Abdulah Abdulah Zadeh |
| 2007 | MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li |
| 2007 | Modeling Agreement Problems in the Universal Composability Framework. Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta |
| 2007 | New Construction of Group Secret Handshakes Based on Pairings. Lan Zhou, Willy Susilo, Yi Mu |
| 2007 | On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. Qianli Zhang, Jilong Wang, Xing Li |
| 2007 | Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. Mooseop Kim, JaeCheol Ryou |
| 2007 | Preventing Unofficial Information Propagation. Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon |
| 2007 | Privacy Protection on Multiple Sensitive Attributes. Zhen Li, Xiaojun Ye |
| 2007 | Secure Multiparty Computation of DNF. Kun Peng |
| 2007 | Short Group Signature Without Random Oracles. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin |
| 2007 | Square Like Attack on Camellia. Duo Lei, Chao Li, Keqin Feng |
| 2007 | Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Charalampos Papamanthou, Roberto Tamassia |
| 2007 | Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. Rui Xue, Dengguo Feng |
| 2007 | What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security. Xiaowei Huang, Li Jiao, Weiming Lu |