| 2004 | A Distributed High Assurance Reference Monitor. Ajay Chander, Drew Dean, John C. Mitchell |
| 2004 | A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon |
| 2004 | A Model for the Semantics of Attack Signatures in Misuse Detection Systems. Michael Meier |
| 2004 | An Efficient Online Electronic Cash with Unlinkable Exact Payments. Toru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama |
| 2004 | An XML-Based Approach to Document Flow Verification. Elisa Bertino, Elena Ferrari, Giovanni Mella |
| 2004 | Certificate Recommendations to Improve the Robustness of Web of Trust. Qinglin Jiang, Douglas S. Reeves, Peng Ning |
| 2004 | Chameleon Hashing Without Key Exposure. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim |
| 2004 | Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater |
| 2004 | Detecting Software Theft via Whole Program Path Birthmarks. Ginger Myles, Christian S. Collberg |
| 2004 | Detection of Sniffers in an Ethernet Network. Zouheir Trabelsi, Hamza Rahmani |
| 2004 | Effective Security Requirements Analysis: HAZOP and Use Cases. Thitima Srivatanakul, John A. Clark, Fiona Polack |
| 2004 | Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. Alex Hai Wang, Peng Liu, Lunquan Li |
| 2004 | Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. Muxiang Zhang |
| 2004 | How to Break and Repair a Universally Composable Signature Functionality. Michael Backes, Dennis Hofheinz |
| 2004 | Image Recognition CAPTCHAs. Monica Chew, J. D. Tygar |
| 2004 | Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings Kan Zhang, Yuliang Zheng |
| 2004 | Low-Level Ideal Signatures and General Integrity Idealization. Michael Backes, Birgit Pfitzmann, Michael Waidner |
| 2004 | Model-Checking Access Control Policies. Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobbens |
| 2004 | Modifiable Digital Content Protection in P2P. Heejae Park, Jong Kim |
| 2004 | On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. Raphael Chung-Wei Phan, Helena Handschuh |
| 2004 | On The Security of Key Derivation Functions. Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato |
| 2004 | Practical Authenticated Key Agreement Using Passwords. Taekyoung Kwon |
| 2004 | Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. HongQian Karen Lu, Asad M. Ali |
| 2004 | Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski |
| 2004 | RSA Accumulator Based Broadcast Encryption. Craig Gentry, Zulfikar Ramzan |
| 2004 | Radix-r Non-Adjacent Form. Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu |
| 2004 | Re-thinking Security in IP Based Micro-Mobility. Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen |
| 2004 | Securing DBMS: Characterizing and Detecting Query Floods. Elisa Bertino, Teodoro Leggieri, Evimaria Terzi |
| 2004 | Security Analysis of Two Signcryption Schemes. Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon |
| 2004 | Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang |
| 2004 | Storage-Efficient Stateless Group Key Revocation. Pan Wang, Peng Ning, Douglas S. Reeves |
| 2004 | Survey on the Technological Aspects of Digital Rights Management. William Ku, Chi-Hung Chi |
| 2004 | The Obfuscation Executive. Kelly Heffner, Christian S. Collberg |
| 2004 | Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). Richard Bergmair, Stefan Katzenbeisser |
| 2004 | Universally Composable Secure Mobile Agent Computation. Ke Xu, Stephen R. Tate |
| 2004 | Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. Mark Foster, Joseph N. Wilson, Shigang Chen |
| 2004 | Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. Deholo Nali, Carlisle M. Adams, Ali Miri |