| 2000 | A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken |
| 2000 | A First Step Towards the Automatic Generation of Security Protocols. Adrian Perrig, Dawn Xiaodong Song |
| 2000 | A Lightweight Tool for Detecting Web Server Attacks. Magnus Almgren, Hervé Debar, Marc Dacier |
| 2000 | A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems. Yki Kortesniemi, Tero Hasu, Jonna Särs |
| 2000 | Accountability and Control of Process Creation in Metasystems. Marty Humphrey, Frederick Knabe, Adam Ferrari, Andrew S. Grimshaw |
| 2000 | An IPSec-based Host Architecture for Secure Internet Multicast. Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha |
| 2000 | Analysis of a Fair Exchange Protocol. Vitaly Shmatikov, John C. Mitchell |
| 2000 | Building Adaptive and Agile Applications Using Intrusion Detection and Response. Joseph P. Loyall, Partha P. Pal, Richard E. Schantz, Franklin Webber |
| 2000 | Chameleon Signatures. Hugo Krawczyk, Tal Rabin |
| 2000 | Optimized Rekey for Group Communication Systems. Ohad Rodeh, Kenneth P. Birman, Danny Dolev |
| 2000 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA |
| 2000 | Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. Stephen T. Kent, Charles Lynn, Joanne Mikkelson, Karen Seo |
| 2000 | Secure Password-Based Cipher Suite for TLS. Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner |
| 2000 | Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies. Deborah Shands, Richard Yee, Jay Jacobs, E. John Sebes |
| 2000 | Security of Encrypted rlogin Connections Created With Kerberos IV. Kirsten Hildrum |
| 2000 | User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. K. Jain, R. Sekar |