| 2001 | A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. Sofia K. Tzelepi, George Pangalos |
| 2001 | A Logical Model for Privacy Protection. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang |
| 2001 | A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. Mark Chapman, George I. Davida, Marc Rennhard |
| 2001 | A Secure Publishing Service for Digital Libraries of XML Documents. Elisa Bertino, Barbara Carminati, Elena Ferrari |
| 2001 | A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. Rainer Steinwandt, Willi Geiselmann, Thomas Beth |
| 2001 | Absolute Privacy in Voting. Dmitri Asonov, Markus Schaal, Johann Christoph Freytag |
| 2001 | An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. Stanley Chow, Yuan Xiang Gu, Harold Johnson, Vladimir A. Zakharov |
| 2001 | An Auditable Metering Scheme for Web Advertisement Applications. Liqun Chen, Wenbo Mao |
| 2001 | An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. Olivier Markowitch, Steve Kremer |
| 2001 | Approximate Power Roots in Z Ismael Jiménez Calvo, Germán Sáez |
| 2001 | Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró |
| 2001 | Broker-Based Secure Negotiation of Intellectual Property Rights. Jaime Delgado, Isabel Gallego, Xavier Perramon |
| 2001 | DISSECT: DIStribution for SECurity Tool. Enriquillo Valdez, Moti Yung |
| 2001 | Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki |
| 2001 | Design of the Decision Support System for Network Security Management to Secure Enterprise Network. Jae Seung Lee, Sang-Choon Kim |
| 2001 | Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. Sheng-Bo Xu, Lejla Batina |
| 2001 | Efficient Kerberized Multicast in a Practical Distributed Setting. Giovanni Di Crescenzo, Olga Kornievskaia |
| 2001 | Efficient Optimistic N-Party Contract Signing Protocol. Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger |
| 2001 | Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison. Koji Chida, Kunio Kobayashi, Hikaru Morita |
| 2001 | Efficient Transferable Cash with Group Signatures. Ik Rae Jeong, Dong Hoon Lee, Jong In Lim |
| 2001 | Elliptic Curve Arithmetic Using SIMD. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro |
| 2001 | Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott |
| 2001 | Fingerprinting Text in Logical Markup Languages. Christian Damsgaard Jensen |
| 2001 | Hyppocrates. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi |
| 2001 | Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings George I. Davida, Yair Frankel |
| 2001 | Lenient/Strict Batch Verification in Several Groups. Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi |
| 2001 | Liability of Certification Authorities: A Juridical Point of View. Apollònia Martínez Nadal, Josep-Lluís Ferrer-Gomila |
| 2001 | Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. Jia Wang, Insup Lee |
| 2001 | Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. Francesc Sebé, Josep Domingo-Ferrer |
| 2001 | On the Complexity of Public-Key Certificate Validation. Diana Berbecaru, Antonio Lioy, Marius Marian |
| 2001 | On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi |
| 2001 | Persistent Authenticated Dictionaries and Their Applications. Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia |
| 2001 | Privacy Amplification Theorem for Noisy Main Channel. Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky |
| 2001 | Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. Routo Terada, Paulo G. Pinheiro |
| 2001 | Robust New Method in Frequency Domain Watermarking. David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra |
| 2001 | SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. Antonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
| 2001 | Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. Bodo Möller |
| 2001 | Suitability of a Classical Analysis Method for E-commerce Protocols. Sigrid Gürgens, Javier López |