| 2001 | A note on proactive password checking. Jeff Jianxin Yan |
| 2001 | A trusted process to digitally sign a document. Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler |
| 2001 | AngeL: a tool to disarm computer systems. Danilo Bruschi, Emilia Rosti |
| 2001 | Computational paradigms and protection. Simon N. Foley, John P. Morrison |
| 2001 | Heterogeneous networking: a new survivability paradigm. Yongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao |
| 2001 | Information security is information risk management. Bob Blakley, Ellen McDermott, Daniel E. Geer Jr. |
| 2001 | Model-Carrying Code (MCC): a new paradigm for mobile-code security. R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka |
| 2001 | Ontology in information security: a useful theoretical foundation and methodological tool. Victor Raskin, Christian Hempelmann, Katrina E. Triezenberg, Sergei Nirenburg |
| 2001 | Position statement for Hilary H. Hosmer |
| 2001 | Pretty good persuasion: a first step towards effective password security in the real world. Dirk Weirich, Martina Angela Sasse |
| 2001 | Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001 Victor Raskin, Steven J. Greenwald, Brenda Timmerman, Darrell M. Kienzle |
| 2001 | Safe and sound: a safety-critical approach to security. Sacha Brostoff, Martina Angela Sasse |
| 2001 | Secure multi-party computation problems and their applications: a review and open problems. Wenliang Du, Mikhail J. Atallah |
| 2001 | Survival by defense-enabling. Partha P. Pal, Franklin Webber, Richard E. Schantz |
| 2001 | The New Security Paradigms Workshop - boom or bust?: a panel. Steven J. Greenwald |
| 2001 | The New Security Paradigms Workshop - boom or bust?: thinking in an age of instant communication; communicating in a time of reflective thought. Marvin Schaefer |
| 2001 | Tracking influence through citation index comparisons and preliminary case studies panel position statement. Mary Ellen Zurko |