| 2005 | "Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung |
| 2005 | A Cryptographic Solution for General Access Control. Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu |
| 2005 | A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis |
| 2005 | A Formal Definition for Trust in Distributed Systems. Daoxi Xiu, Zhaoyu Liu |
| 2005 | A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy |
| 2005 | A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. Kun Peng, Colin Boyd, Ed Dawson |
| 2005 | A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim |
| 2005 | A Practical Voting Scheme with Receipts. Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
| 2005 | A Privacy Preserving Rental System. Yanjiang Yang, Beng Chin Ooi |
| 2005 | An Oblivious Transfer Protocol with Log-Squared Communication. Helger Lipmaa |
| 2005 | Analysis and Improvement of a Signcryption Scheme with Key Privacy. Guomin Yang, Duncan S. Wong, Xiaotie Deng |
| 2005 | Building a Cryptovirus Using Microsoft's Cryptographic API. Adam L. Young |
| 2005 | Certificateless Public Key Encryption Without Pairing. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
| 2005 | Chaum's Designated Confirmer Signature Revisited. Jean Monnerat, Serge Vaudenay |
| 2005 | Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. Chi-Ming Hu, Wen-Guey Tzeng |
| 2005 | Constant Round Dynamic Group Key Agreement. Ratna Dutta, Rana Barua |
| 2005 | Device-Enabled Authorization in the Grey-System. Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar |
| 2005 | Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn |
| 2005 | Efficient and Proactive Threshold Signcryption. Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu |
| 2005 | Electronic Voting: Starting Over? Yvo Desmedt, Kaoru Kurosawa |
| 2005 | Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? Chris J. Mitchell |
| 2005 | Evaluating Access Control Policies Through Model Checking. Nan Zhang, Mark Ryan, Dimitar P. Guelev |
| 2005 | Hardware Architecture and Cost Estimates for Breaking SHA-1. Akashi Satoh |
| 2005 | Hybrid Signcryption Schemes with Outsider Security. Alexander W. Dent |
| 2005 | ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku |
| 2005 | IPSec Support in NAT-PT Scenario for IPv6 Transition. Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim |
| 2005 | Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Jianying Zhou, Javier López, Robert H. Deng, Feng Bao |
| 2005 | Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. Xiaolan Joy Zhang, Brian King |
| 2005 | New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. Zhenghong Wang, Ruby B. Lee |
| 2005 | On the Notion of Statistical Security in Simulatability Definitions. Dennis Hofheinz, Dominique Unruh |
| 2005 | On the Security of Tweakable Modes of Operation: TBC and TAE. Peng Wang, Dengguo Feng, Wenling Wu |
| 2005 | On the Security of the WinRAR Encryption Method. Gary S.-W. Yeo, Raphael Chung-Wei Phan |
| 2005 | SVision: A Network Host-Centered Anomaly Visualization Technique. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani |
| 2005 | Time-Based Release of Confidential Information in Hierarchical Settings. Deholo Nali, Carlisle M. Adams, Ali Miri |
| 2005 | Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee |
| 2005 | Towards Better Software Tamper Resistance. Hongxia Jin, Ginger Myles, Jeffery Lotspiech |
| 2005 | Tracing-by-Linking Group Signatures. Victor K. Wei |
| 2005 | Universally Composable Time-Stamping Schemes with Audit. Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson |