| 2007 | A 3g IMS-based Testbed for Secure Real-Time Audio Sessions. Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione |
| 2007 | A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection. Hongxia Jin |
| 2007 | A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. Kazumasa Omote, Takeshi Shimoyama, Satoru Torii |
| 2007 | A High-Level Aspect-Oriented based Language for Software Security Hardening. Azzam Mourad, Marc-André Laverdière, Mourad Debbabi |
| 2007 | A More Efficient Convertible Nominative Signature. Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong |
| 2007 | A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps. Shivaramakrishnan Narayan, Parampalli Udaya |
| 2007 | A Query Unit for The IPSec Databases. Alberto Ferrante, Sathish Chandra, Vincenzo Piuri |
| 2007 | A Secure Jailing System for Confining Untrusted Applications. Guido van 't Noordende, Ádám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum |
| 2007 | Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs. Amitabh Saxena |
| 2007 | An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing. Adrian Leung, Geong Sen Poh |
| 2007 | An Effective and Secure Watermarking Protocol for Digital Rights Protection over the Second-Hand Market. Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy |
| 2007 | An Efficient Intrusion Detection System for Networks with Centralized Routing. Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro |
| 2007 | An Improved Model for Secure Cryptographic Integrity Verification of Local Code. Christian Payne |
| 2007 | Anonymous Prepaid Content Viewing System with Mobile Terminal. Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka |
| 2007 | Clock Control Sequence Reconstruction in the Generalized Shrinking Generator. Slobodan Petrovic |
| 2007 | Combined Data Mining Approach for Intrusion Detection. Urko Zurutuza, Roberto Uribeetxeberria, Ekain Azketa, G. Gil, Jesus Lizarraga, Miguel Fernández |
| 2007 | Cross-Layer Resource Allocation in Satellite Networks. Franco Davoli |
| 2007 | Detecting Anomalous Traffic using Statistical Processing and Self-Organizing Maps. Paola Baldassarri, Anna Montesanto, Paolo Puliti |
| 2007 | Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini |
| 2007 | Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies. Annett Laube, Laurent Gomez |
| 2007 | Efficient Large-Scale Distributed Key Generation against Burst Interruption. Jheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng |
| 2007 | Extensible Access Control Model for XML Document Collections. Goran Sladic, Branko Milosavljevic, Zora Konjovic |
| 2007 | Formal Analysis Methods of Network Security Design. Mariusz Stawowski |
| 2007 | Future and Challenges of the Security of e-Systems and Computer Networks. Mohammad S. Obaidat |
| 2007 | Identity Based Public Key Exchange (IDPKE) for Wireless Ad Hoc Networks. Clare McGrath, Ghazanfar Ali Safdar, Máire McLoone |
| 2007 | Implementation and Analysis of a Handwritten Signature Verification Technique. Alan McCabe, Jarrod Trevathan |
| 2007 | Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. Masaki Inamura, Toshiaki Tanaka |
| 2007 | Improving Security in Chaotic Spread Spectrum Communication Systems with a Novel 'Bit Power Parameter Spectrum' Measure. Branislav Jovic, Charles P. Unsworth |
| 2007 | Independent Voter Verifiability for Remote Electronic Voting. Jordi Puiggali, Victor Morales-Rocha |
| 2007 | Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. Günther Pernul |
| 2007 | Integrated Right Management for Home Content - A SIM based Right Management Solution for Home Networks. György Kálmán, Josef Noll |
| 2007 | Investigation of Cooperative Defense against DDoS. Igor V. Kotenko, Alexander Ulanov |
| 2007 | K2: A Stream Cipher Algorithm using Dynamic Feedback Control. Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai |
| 2007 | MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. Rafael Páez, Joan Tomàs, Jordi Forné, Miguel Soriano |
| 2007 | Mobile Agent Security with Efficient Oblivious Transfer. Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji |
| 2007 | Mobile Secret Key Distribution with Network Coding. Paulo F. Oliveira, Rui A. Costa, João Barros |
| 2007 | Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security. M. Razvi Doomun, K. M. Sunjiv Soyjaudah |
| 2007 | On the Effect of Score Equalization in SVM Multimodal Biometric Systems. Pascual Ejarque, Javier Hernando |
| 2007 | On the Improvement of Remote Authentication Scheme with Smart Cards. Lih-Yang Wang, Chao-Chih Chen |
| 2007 | On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides |
| 2007 | Practical Secure Biometrics using Set Intersection as a Similarity Measure. Daniel Socek, Dubravko Culibrk, Vladimir Bozovic |
| 2007 | Practical Verification of Untrusted Terminals using Remote Attestation. Simone Lupetti, Gianluca Dini |
| 2007 | Practical and Universal Interpretation Functions for Secrecy. Hanane Houmani, Mohamed Mejri |
| 2007 | Pragmatic Computing. Kecheng Liu |
| 2007 | Privacy Preserving k-Means Clustering in Multi-Party Environment. Saeed Samet, Ali Miri, Luis Orozco-Barbosa |
| 2007 | Private Computing with Beehive Organized Agents. Bartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen |
| 2007 | Recent Trends in the Design of Video Signal Processing IPS and Multimedia SoCs. Santanu Dutta |
| 2007 | Reliable Process for Security Policy Deployment. Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain |
| 2007 | Remote Algorithmic Complexity Attacks against Randomized Hash Tables. Noa Bar-Yosef, Avishai Wool |
| 2007 | Role and Task Based Authorization Management for Process-View. Mei-Yu Wu, Duen-Ren Liu |
| 2007 | SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Javier Hernando, Eduardo Fernández-Medina, Manu Malek |
| 2007 | SOA Wisdom. Tony C. Shan |
| 2007 | Secure Computation of Common Data among Malicious Partners. Sebastian Obermeier, Stefan Böttcher |
| 2007 | Secure License Management - Management of Digital Object Licenses in a DRM Environment. Carlos Serrão, Miguel Sales Dias, Jaime Delgado |
| 2007 | Secure Service Publishing with Untrusted Registries - Securing Service Discovery. Slim Trabelsi, Yves Roudier |
| 2007 | Securing Healthgrid Environments. Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis |
| 2007 | Securing OpenSSL against Micro-Architectural Attacks. Marc Joye, Michael Tunstall |
| 2007 | Subquadratic Binary Field Multiplier in Double Polynomial System. Pascal Giorgi, Christophe Nègre, Thomas Plantard |
| 2007 | The Polynomial Multicomposition Problem in (Z/nZ). Neculai Daniel Stoleru, Victor Valeriu Patriciu |
| 2007 | Towards User Authentication Flexibility. Laurent Gomez, Ivonne Thomas |
| 2007 | Towards a Multi-model Views Security Framework. Lei Xia, Hao Huang, Shuying Yu |
| 2007 | Using Steganography to Improve Hash Functions' Collision Resistance. Emmanouel Kellinis, Konstantinos Papapanagiotou |
| 2007 | Utility Computing: Reality and Beyond. Ivan Ivanov |
| 2007 | Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking. Adnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim |
| 2007 | Utilizing Social Networking Platforms to Support Public Key Infrastructures. Volker Gruhn, Malte Hülder, Vincent Wolff-Marting |
| 2007 | Wise Guard - MAC Address Spoofing Detection System for Wireless LANs. Kai Tao, Jing Li, Srinivas Sampalli |
| 2007 | e-Business Security Design using Process Security Requirements Septet. Sharon Nachtigal |