| 1997 | An Interface Specification Language for Automatically Analyzing Cryptographic Protocols. Stephen H. Brackin |
| 1997 | Blocking Java Applets at the Firewall. David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin |
| 1997 | Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis. Abdelaziz Mounji, Baudouin Le Charlier |
| 1997 | Distributed Authentication in Kerberos Using Public Key Cryptography. Marvin A. Sirbu, John C.-I. Chuang |
| 1997 | Experimental Results of Covert Channel Limitation in One-Way Communication Systems. Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppel, Sean W. O'Malley, Oliver Spatscheck |
| 1997 | Hierarchical Organization of Certification Authorities for Secure Environments. Lourdes López-Santidrián, Justo Carracedo Gallardo |
| 1997 | Misplaced Trust: Kerberos 4 Session Keys. Bryn Dole, Steven W. Lodin, Eugene H. Spafford |
| 1997 | Panel - Security and the World Wide Web. G. Winfield Treese |
| 1997 | Probable Plaintext Cryptanalysis of the IP Security Protocols. Steven M. Bellovin |
| 1997 | Proceedings of the Network and Distributed System Security Symposium, NDSS 1997, San Diego, California, USA |
| 1997 | Reducing the Cost of Security in Link-State Routing. Ralf C. Hauser, Tony Przygienda, Gene Tsudik |
| 1997 | Securing Distance-Vector Routing Protocols. Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-Aceves |
| 1997 | Securing Web Access with DCE. Brian C. Schimpf |
| 1997 | Securing the Nimrod Routing Architecture. Karen E. Sirois, Stephen T. Kent |
| 1997 | Trust Models in ICE-TEL. Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick |