| 2007 | A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. Yvo Desmedt, Kaoru Kurosawa |
| 2007 | An Efficient Certified Email Protocol. Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao |
| 2007 | Detecting System Emulators. Thomas Raffetseder, Christopher Krügel, Engin Kirda |
| 2007 | Differential Properties of Elliptic Curves and Blind Signatures. Billy Bob Brumley, Kaisa Nyberg |
| 2007 | E-NIPS: An Event-Based Network Intrusion Prediction System. Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque |
| 2007 | Efficient Committed Oblivious Transfer of Bit Strings. Mehmet S. Kiraz, Berry Schoenmakers, José Villegas |
| 2007 | Efficient Negative Databases from Cryptographic Hash Functions. George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel |
| 2007 | Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. Pradeep Kumar Mishra, Vassil S. Dimitrov |
| 2007 | Enabling Fairer Digital Rights Management with Trusted Computing. Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg |
| 2007 | Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. Joachim Biskup, Jan-Hendrik Lochner |
| 2007 | Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. Iosif-Viorel Onut, Ali A. Ghorbani |
| 2007 | High-Speed Pipelined Hardware Architecture for Galois Counter Mode. Akashi Satoh, Takeshi Sugawara, Takafumi Aoki |
| 2007 | Identity-Based Proxy Re-encryption Without Random Oracles. Cheng-Kang Chu, Wen-Guey Tzeng |
| 2007 | Impossible-Differential Attacks on Large-Block Rijndael. Jorge Nakahara Jr., Ivan Carlos Pavão |
| 2007 | Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta |
| 2007 | Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. Joo Yeon Cho, Josef Pieprzyk |
| 2007 | New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Gautham Sekar, Souradyuti Paul, Bart Preneel |
| 2007 | On the Concept of Software Obfuscation in Computer Security. Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov |
| 2007 | On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. Fabien Laguillaumie, Damien Vergnaud |
| 2007 | Queue Management as a DoS Counter-Measure? Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins |
| 2007 | Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. Alexander W. Dent, Qiang Tang |
| 2007 | Small Private-Exponent Attack on RSA with Primes Sharing Bits. Yao-Dong Zhao, Wen-Feng Qi |
| 2007 | Specifying Imperative Data Obfuscations. Stephen Drape, Clark D. Thomborson, Anirban Majumdar |
| 2007 | Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. Sherman S. M. Chow, Kim-Kwang Raymond Choo |
| 2007 | The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Debra L. Cook, Moti Yung, Angelos D. Keromytis |
| 2007 | Token-Controlled Public Key Encryption in the Standard Model. Sherman S. M. Chow |
| 2007 | Towards a DL-Based Additively Homomorphic Encryption Scheme. Guilhem Castagnos, Benoît Chevallier-Mames |
| 2007 | Traitor Tracing with Optimal Transmission Rate. Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan |
| 2007 | Trapdoor Permutation Polynomials of Z/ Guilhem Castagnos, Damien Vergnaud |