| 2005 | A Practical Buses Protocol for Anonymous Internet Communication. Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson |
| 2005 | A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. Zhengping Wu, Alfred C. Weaver |
| 2005 | Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? Stephen Neville |
| 2005 | Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. Frédéric Massicotte, Mathieu Couture, Yvan Labiche |
| 2005 | Credential Networks: a General Model for Distributed Trust and Authenticity Management. Jacek Jonczy, Rolf Haenni |
| 2005 | Detecting Computer Intrusions Using Behavioral Biometrics. Ahmed Awad E. Ahmed, Issa Traoré |
| 2005 | Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. Tim Storer, Ishbel Duncan |
| 2005 | Enforcing Privacy in Web Applications. Ariel Futoransky, Ariel Waissbein |
| 2005 | Generic Reliability Trust Model. Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja |
| 2005 | Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. Nazar Elfadil |
| 2005 | How to Calculate the Information Privacy. Sabah S. Al-Fedaghi |
| 2005 | Information Visualization for Intrusion Detection. James Blustein, Daniel L. Silver, Ching-Lung Fu |
| 2005 | Link-Time Enforcement of Confined Types for JVM Bytecode. Philip W. L. Fong |
| 2005 | MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer |
| 2005 | MozPETs - a privacy enhanced Web Browser. Lars Brückner, Marco Voss |
| 2005 | Network Intrusion Detection using Random Forests. Jiong Zhang, Mohammad Zulkernine |
| 2005 | PEEP- Privacy Enforcement in Email Project. Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz |
| 2005 | Providing Personalized Privacy Support in Public Places. Carsten Röcker |
| 2005 | Public Trust and Electronic Health Records. Mike Smit, Michael McAllister, Jacob Slonim |
| 2005 | SHEMP: Secure Hardware Enhanced MyProxy. John Marchesini, Sean W. Smith |
| 2005 | Security Analysis of Wireless Java. Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua |
| 2005 | Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
| 2005 | Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. Jeff Gilchrist |
| 2005 | Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. George Yee, Larry Korba |
| 2005 | The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets. Kevin Regan, Robin Cohen, Pascal Poupart |
| 2005 | Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings |
| 2005 | Towards Eliminating Steganographic Communication. Anthony D. Whitehead |
| 2005 | Towards a Privacy Access Control Model for e-Healthcare Services. Patrick C. K. Hung |
| 2005 | Trustworthiness Measure for e-Service. Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon |
| 2005 | Ubiquitous Redirection as Access Control Response. George Bakos, Sergey Bratus |
| 2005 | Usable Firewall Configuration. Weiwei Geng, Scott Flinn, John M. DeDourek |
| 2005 | User Perceptions of Privacy and Security on the Web. Scott Flinn, Jo Lumsden |