| 2007 | A privacy expectations and security assurance offer system. Jeffrey Hunker |
| 2007 | Authenticated names. Stanley Chow, Christophe Gustave, Dmitri Vinokurov |
| 2007 | Computing under occupation. Klaus Kursawe, Stefan Katzenbeisser |
| 2007 | Information protection via environmental data tethers. Matt Beaumont-Gay, Kevin Eustice, Peter L. Reiher |
| 2007 | Position: the user is the enemy. Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya |
| 2007 | Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA - September 18-21, 2007 Konstantin Beznosov, Angelos D. Keromytis |
| 2007 | Robustly secure computer systems: a new security paradigm of system discontinuity. Jon A. Solworth |
| 2007 | Security and usability: the gap in real-world online banking. Mohammad Mannan, Paul C. van Oorschot |
| 2007 | Security automation considered harmful? W. Keith Edwards, Erika Shehan Poole, Jennifer Stoll |
| 2007 | Self-healing: science, engineering, and fiction. Michael E. Locasto |
| 2007 | The future of biologically-inspired security: is there anything left to learn? Anil Somayaji, Michael E. Locasto, Jan Feyereisl |
| 2007 | VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures. Deholo Nali, Paul C. van Oorschot, Andy Adler |