| 2005 | A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. David Sánchez Sánchez, Heribert Baldus |
| 2005 | A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. Jyh-How Huang, Jason Buckingham, Richard Han |
| 2005 | A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. Tassos Dimitriou |
| 2005 | A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. Amir A. Sayegh, Mahmoud T. El-Hadidi |
| 2005 | A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks. Jing Deng, Carl Hartung, Richard Han, Shivakant Mishra |
| 2005 | A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. Marco Voss, Andreas Heinemann, Max Mühlhäuser |
| 2005 | A Privacy Service for Context-aware Mobile Computing. Vagner J. do Sacramento Rodrigues, Markus Endler, Fernando N. Nascimento |
| 2005 | A Solution for Wireless Privacy and Payments based on E-cash. A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis |
| 2005 | An Efficient Key Management Algorithm for Hierarchical Group Communication. H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal |
| 2005 | An Extensible Environment for Evaluating Secure MANET. Yongguang Zhang, Yi-an Huang, Wenke Lee |
| 2005 | An RFID Distance Bounding Protocol. Gerhard P. Hancke, Markus G. Kuhn |
| 2005 | Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks. Ioannis Pavlosoglou, Mark S. Leeson, Roger J. Green |
| 2005 | Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. Roberto Di Pietro, Stefano Chessa, Piero Maestrini |
| 2005 | Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. Jing Deng, Richard Han, Shivakant Mishra |
| 2005 | DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru |
| 2005 | Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Urs Hengartner, Peter Steenkiste |
| 2005 | First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005 |
| 2005 | Implications of Unlicensed Mobile Access (UMA) for GSM security. Sandro Grech, Pasi Eronen |
| 2005 | Improving Cross-domain Authentication overWireless Local Area Networks. Hahnsang Kim, Kang G. Shin, Walid Dabbous |
| 2005 | MOTET: Mobile Transactions using Electronic Tickets. Daniele Quercia, Stephen Hailes |
| 2005 | On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. Danfeng Yao, Roberto Tamassia, Seth Proctor |
| 2005 | On the Security of Distributed Position Services. Xiaoxin Wu, Cristina Nita-Rotaru |
| 2005 | On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru |
| 2005 | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. Ziv Kfir, Avishai Wool |
| 2005 | Protecting Location Privacy Through Path Confusion. Baik Hoh, Marco Gruteser |
| 2005 | Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu |
| 2005 | Reducing Reauthentication Delay in Wireless Networks. Tuomas Aura, Michael Roe |
| 2005 | SPINAT: Integrating IPsec into Overlay Routing. Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig |
| 2005 | Securing Topology Maintenance Protocols for Sensor Networks. Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia |
| 2005 | Security and Privacy Issues in E-passports. Ari Juels, David Molnar, David A. Wagner |
| 2005 | Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks. Yu Liu, Yang Li, Hong Man |
| 2005 | Short Paper: A Secure Interworking Scheme for UMTS-WLAN. Yen-Chieh Ouyang, Chung-Hua Chu |
| 2005 | Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance. Thomas E. Daniels, Mani Mina, Steve Russell |
| 2005 | Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security. Nicholas Bambos |
| 2005 | Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht |
| 2005 | Short Paper: Fellowship in Mobile Ad hoc Networks. Venkatesan Balakrishnan, Vijay Varadharajan |
| 2005 | Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks. Li Zhou, Jinfeng Ni, Chinya V. Ravishankar |
| 2005 | Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith |
| 2005 | Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. Katrin Hoeper, Guang Gong |
| 2005 | Short Paper: Location Privacy with IP Mobility. Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins |
| 2005 | Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. Wassim Itani, Ayman I. Kayssi, Ali Chehab |
| 2005 | Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil |
| 2005 | Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP. Sachin Garg, Navjot Singh, Timothy K. Tsai |
| 2005 | Short Paper: Thor - The Hybrid Online Repository. Timothy W. van der Horst, Kent E. Seamons |
| 2005 | Short Paper: Towards a Location-Aware Role-Based Access Control Model. Indrakshi Ray, Lijun Yu |
| 2005 | Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks. Svetlana Radosavac, Karl Seamon, John S. Baras |
| 2005 | Short paper: Random IDs for preserving location privacy. Stefan Schlott, Frank Kargl, Michael Weber |
| 2005 | Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks. Khaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret |
| 2005 | Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices. Caimu Tang, Anthony T. Chronopoulos, Cauligi S. Raghavendra |
| 2005 | Spread-Identity mechanisms for DOS resilience and Security. Dhananjay S. Phatak |
| 2005 | Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. Ophir Levy, Avishai Wool |