| 2017 | A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. Sean Peisert, Matt Bishop, Edward B. Talbot |
| 2017 | Beyond the pretty penny: the Economic Impact of Cybercrime. Carlos Hernandez Gañán, Michael Ciere, Michel van Eeten |
| 2017 | Can I believe you?: Establishing Trust in Computer Mediated Introductions. Borke Obada-Obieh, Anil Somayaji |
| 2017 | Developer-centered security and the symmetry of ignorance. Olgierd Pieczul, Simon N. Foley, Mary Ellen Zurko |
| 2017 | End-to-End Passwords. Scott Ruoti, Kent E. Seamons |
| 2017 | Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World. Nick Merrill, Max T. Curran, John Chuang |
| 2017 | Market-based Security for Distributed Applications. George Bissias, Brian Neil Levine, Nikunj Kapadia |
| 2017 | Panel: Empirically-based Secure OS Design. Sam Weber, Adam Shostack, Jon A. Solworth, Mary Ellen Zurko |
| 2017 | Practicing a Science of Security: A Philosophy of Science Perspective. Jonathan M. Spring, Tyler Moore, David J. Pym |
| 2017 | Proceedings of the 2017 New Security Paradigms Workshop, NSPW 2017, Santa Cruz, CA, USA, October 01-04, 2017 |
| 2017 | Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. Karen Renaud, Merrill Warkentin |
| 2017 | The Third Wave?: Inclusive Privacy and Security. Yang Wang |