| 2007 | A context service for multimodal pervasive environments. Antonio Coronato, Giuseppe De Pietro |
| 2007 | A feedback reputation mechanism to secure the optimized link state routing protocol. João P. Vilela, João Barros |
| 2007 | A layout-similarity-based approach for detecting phishing pages. Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi |
| 2007 | A model for usage control in GRID systems. Fabio Martinelli |
| 2007 | A model for usage control in GRID systems. Fabio Martinelli, Paolo Mori |
| 2007 | A secure and efficient key management scheme for wireless sensor networks. Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee |
| 2007 | A study on secure RFID authentication protocol in insecure communication. Jang-Su Park, Soo-Young Kang, Im-Yeong Lee |
| 2007 | Aggregation of attributes from different authorities. David W. Chadwick |
| 2007 | An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations. Gautier Dallons, Philippe Massonet, Jean-François Molderez, Christophe Ponsard, Alvaro Arenas |
| 2007 | An assessment of VoIP covert channel threats. Takehiro Takahashi, Wenke Lee |
| 2007 | An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures. Wassim Itani, Ayman I. Kayssi, Ali Chehab |
| 2007 | An entropy based method for measuring anonymity. Michele Bezzi |
| 2007 | Anonymity and security in delay tolerant networks. Aniket Kate, Gregory M. Zaverucha, Urs Hengartner |
| 2007 | Beyond web 2.0: enabling multimodal web interactions using VoIP and Ajax. Giovanni Frattini, Pierpaolo Petriccione, Giuseppe Leone, Gianluca Supino, Fabio Corvino |
| 2007 | Breaking EMAP. Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy |
| 2007 | Deception framework for sensor networks. Ruiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru |
| 2007 | Design patterns for secure virtual organization management architecture. Angelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda |
| 2007 | Detecting bogus BGP route information: Going beyond prefix hijacking. Jian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci |
| 2007 | Detecting worms via mining dynamic program execution. Xun Wang, Wei Yu, Adam C. Champion, Xinwen Fu, Dong Xuan |
| 2007 | Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. Ahren Studer, Mark Luk, Adrian Perrig |
| 2007 | Enhancing frequency-based wormhole attack detection with novel jitter waveforms. Maria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason |
| 2007 | Evolution of networking: Current problems and future directions. Pekka Nikander |
| 2007 | Flexible and high-performance anonymization of NetFlow records using anontool. Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos |
| 2007 | Gaining users' trust by publishing failure probabilities. Dominic Battré, Karim Djemame, Odej Kao, Kerstin Voß |
| 2007 | Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services. Frank J. Suraci, Arye R. Ephrath, John R. Wullert |
| 2007 | Implications of radio fingerprinting on the security of sensor networks. Kasper Bonne Rasmussen, Srdjan Capkun |
| 2007 | Intrusion Detection and tolerance in Grid-based applications. Jun Wang, Luigi Lo Iacono |
| 2007 | Intrusion detection technology based on CEGA-SVM. Yuxin Wei, Muqing Wu |
| 2007 | Misleading and defeating importance-scanning malware propagation. Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee |
| 2007 | Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach. Xiaoxin Wu, David K. Y. Yau |
| 2007 | Modeling and detection of complex attacks. Seyit Ahmet Çamtepe, Bülent Yener |
| 2007 | NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah |
| 2007 | OpenFire: Using deception to reduce network attacks. Kevin Borders, Laura Falk, Atul Prakash |
| 2007 | Optimizing secure Web Services with MAWeS: A case study. Massimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano |
| 2007 | PWC: A proactive worm containment solution for enterprise networks. Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis |
| 2007 | Parameterizing access control for heterogeneous peer-to-peer applications. Ashish Gehani, Surendar Chandra |
| 2007 | Platform to enforce multiple access control policy in grid hosting environment. Leonardo Mattes, Leonardo C. Militelli, João Antonio Zuffo |
| 2007 | Practical anonymous communication on the mobile internet using Tor. Christer Andersson, Andriy Panchenko |
| 2007 | Privacy-preserving authentication with low computational overhead for RFID systems. Fen Liu, Lei Hu, Li Lu, Weijia Wang |
| 2007 | RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. Claude Castelluccia, Angelo Spognardi |
| 2007 | SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
| 2007 | SET: Detecting node clones in sensor networks. Heesook Choi, Sencun Zhu, Thomas F. La Porta |
| 2007 | Scalable discovery of private resources. Spyros Kotoulas, Ronny Siebes |
| 2007 | Secure computation for data privacy. Meena Dilip Singh, Ashutosh Saxena |
| 2007 | Secure crash reporting in vehicular Ad hoc networks. Sumair Ur Rahman, Urs Hengartner |
| 2007 | Secure lightweight tunnel for monitoring transport containers. Jens Ove Lauf, Harald Sauff |
| 2007 | Secure token passing at application level. Augusto Ciuffoletti |
| 2007 | Securing Personal Network clusters. Assed Jehangir, Sonia M. Heemstra de Groot |
| 2007 | Securing network location awareness with authenticated DHCP. Tuomas Aura, Michael Roe, Steven J. Murdoch |
| 2007 | Securing pseudo identities in an anonymous peer-to-peer file-sharing network. Tom Chothia |
| 2007 | Simple Authentication for the Web. Timothy W. van der Horst, Kent E. Seamons |
| 2007 | Simple cross-site attack prevention. Florian Kerschbaum |
| 2007 | Sybil attack detection in a hierarchical sensor network. Jian Yin, Sanjay Kumar Madria |
| 2007 | Temporal factors to evaluate trustworthiness of virtual identities. Luca Longo, Pierpaolo Dondio, Stephen Barrett |
| 2007 | The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments. Susana Alcalde Bagüés, Jelena Mitic, Elisabeth-Anna Emberger |
| 2007 | The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together. Pekka Nikander |
| 2007 | Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007 |
| 2007 | Trustworthiness of collaborative Open Source Software quality assessment. Jean-Marc Seigneur |
| 2007 | Using recurring costs for reputation management in peer-to-peer streaming systems. Michael Rossberg, Guenter Schaefer, Thorsten Strufe |
| 2007 | Verification method of network simulation for pervasive environments. Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon |
| 2007 | Web Services workflow reliability estimation through reliability patterns. Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi |
| 2007 | iToken: aWireless smart card reader which provides handhelds with desk top equivalent security. Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano |