| 2007 | A Linear Analysis of Blowfish and Khufu. Jorge Nakahara Jr. |
| 2007 | A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. Jianhong Zhang, Jian Mao |
| 2007 | A Sanitizable Signature Scheme with Aggregation. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka |
| 2007 | A Time-Based Key Management Protocol for Wireless Sensor Networks. Jiyong Jang, Taekyoung Kwon, JooSeok Song |
| 2007 | Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. Robert H. Deng, Yanjiang Yang |
| 2007 | An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang |
| 2007 | An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. Saeran Kwon, Sang-Ho Lee |
| 2007 | Application Security - Myth Or Reality? William J. Caelli |
| 2007 | Certificate Based (Linkable) Ring Signature. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
| 2007 | Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. Kun Peng, Ed Dawson |
| 2007 | Formalization of RBAC Policy with Object Class Hierarchy. Jung-Hwa Chae, Nematollaah Shiri |
| 2007 | How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. Yoo-Jin Baek, Ihor V. Vasyltsov |
| 2007 | Identity-Based Threshold Decryption Revisited. Shengli Liu, Kefei Chen, Weidong Qiu |
| 2007 | Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings Ed Dawson, Duncan S. Wong |
| 2007 | On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou |
| 2007 | On the Sequentiality of Three Optimal Structured Multisignature Schemes. Zuhua Shao |
| 2007 | Practical Uses of Virtual Machines for Protection of Sensitive User Data. Peter C. S. Kwan, Glenn Durfee |
| 2007 | Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. Yanjiang Yang, Robert H. Deng, Feng Bao |
| 2007 | Related-Key Rectangle Attack on 43-Round SHACAL-2. Gaoli Wang |
| 2007 | Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li |
| 2007 | Secure Feedback Service in Wireless Sensor Networks. Di Ma |
| 2007 | Secure Signed Radix- Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim |
| 2007 | Some Efficient Algorithms for the Final Exponentiation of Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
| 2007 | Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu |
| 2007 | Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar |
| 2007 | Two-Party Privacy-Preserving Agglomerative Document Clustering. Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai |
| 2007 | Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. Miyuki Uno, Mikio Kano |