| 2002 | Active Certificates: A Framework for Delegation. Nikita Borisov, Eric A. Brewer |
| 2002 | Advanced Client/Server Authentication in TLS. Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith |
| 2002 | An Analysis of the Degradation of Anonymous Protocols. Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields |
| 2002 | BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. Suresh Chari, Pau-Chen Cheng |
| 2002 | Detecting Steganographic Content on the Internet. Niels Provos, Peter Honeyman |
| 2002 | Distributed Pattern Detection for Intrusion Detection. Christopher Krügel, Thomas Toth |
| 2002 | Experimenting with Server-Aided Signatures. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik |
| 2002 | Fast-Track Session Establishment for TLS. Hovav Shacham, Dan Boneh |
| 2002 | Implementing Pushback: Router-Based Defense Against DDoS Attacks. John Ioannidis, Steven M. Bellovin |
| 2002 | Managing Interoperability in Non-Hierarchical Public Key Infrastructures. Peter Hesse, David Lemire |
| 2002 | PAMINA: A Certificate Based Privilege Management System. Zoltán Nochta, Peter Ebinger, Sebastian Abeck |
| 2002 | Performance Analysis of TLS Web Servers. Cristian Coarfa, Peter Druschel, Dan S. Wallach |
| 2002 | Proceedings of the Network and Distributed System Security Symposium, NDSS 2002, San Diego, California, USA |
| 2002 | Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. Gabriel Montenegro, Claude Castelluccia |
| 2002 | Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong |
| 2002 | Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Adam Stubblefield, John Ioannidis, Aviel D. Rubin |