| 2002 | A Distributed and Computationally Secure Key Distribution Scheme. Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez |
| 2002 | A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. Ed Dawson, Javier López, José A. Montenegro, Eiji Okamoto |
| 2002 | A New Offline Privacy Protecting E-cash System with Revokable Anonymity. Weidong Qiu, Kefei Chen, Dawu Gu |
| 2002 | A New Public Key Cryptosystem for Constrained Hardware. Jiande Zheng |
| 2002 | A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. Shunsuke Araki |
| 2002 | A Provably Secure Additive and Multiplicative Privacy Homomorphism. Josep Domingo-Ferrer |
| 2002 | A Realistic Protocol for Multi-party Certified Electronic Mail. Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger |
| 2002 | A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Katsuyuki Okeya, Kouichi Sakurai |
| 2002 | Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. Yasuyuki Sakai, Kouichi Sakurai |
| 2002 | An Access Control Model for Tree Data Structures. Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno |
| 2002 | An Anonymous Loan System Based on Group Signature Scheme. Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
| 2002 | An Attack on a Protocol for Certified Delivery. José R. M. Monteiro, Ricardo Dahab |
| 2002 | An Efficient Dynamic and Distributed Cryptographic Accumulator. Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic |
| 2002 | Automated Analysis of Some Security Mechanisms of SCEP. Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
| 2002 | Certification of Public Keys within an Identity Based System. Liqun Chen, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart |
| 2002 | Comments to the UNCITRAL Model Law on Electronic Signatures. Apollònia Martínez Nadal, Josep-Lluís Ferrer-Gomila |
| 2002 | Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott |
| 2002 | Conditional Cryptographic Delegation for P2P Data Sharing. Yuji Watanabe, Masayuki Numao |
| 2002 | Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2 Soonhak Kwon, Heuisu Ryu |
| 2002 | Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. Wai Han Soo, Azman Samsudin, Alwyn Goh |
| 2002 | Exclusion-Freeness in Multi-party Exchange Protocols. Nicolás González-Deleito, Olivier Markowitch |
| 2002 | Fast Software Implementations of SC2000. Helger Lipmaa |
| 2002 | Fingerprinting Concatenated Codes with Efficient Identification. Marcel Fernandez, Miguel Soriano |
| 2002 | Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. Kahil Jallad, Jonathan Katz, Bruce Schneier |
| 2002 | Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Agnes Hui Chan, Virgil D. Gligor |
| 2002 | Intrusion Detection with Support Vector Machines and Generative Models. John S. Baras, Maben Rabi |
| 2002 | Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2 Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo |
| 2002 | Oblivious Counter and Majority Protocol. Hiroaki Kikuchi |
| 2002 | On Optimal Hash Tree Traversal for Interval Time-Stamping. Helger Lipmaa |
| 2002 | On the Difficulty of Protecting Private Keys in Software. Taekyoung Kwon |
| 2002 | Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. Bodo Möller |
| 2002 | Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye |
| 2002 | Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. Emmanuel Bresson, Jacques Stern |
| 2002 | Quantifying Privacy Leakage through Answering Database Queries. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen |
| 2002 | Real-Time Intruder Tracing through Self-Replication. Heejin Jang, Sangwook Kim |
| 2002 | Receipt-Free Sealed-Bid Auction. Masayuki Abe, Koutarou Suzuki |
| 2002 | Role-Based Access Control for E-commerce Sea-of-Data Applications. Guillermo Navarro, Sergi Robles, Joan Borrell |
| 2002 | Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. Akashi Satoh, Sumio Morioka |
| 2002 | Traceability Schemes for Signed Documents. Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai |