| 2000 | 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000 Steven M. Bellovin, Greg Rose |
| 2000 | A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. Jonathan Katz, Bruce Schneier |
| 2000 | A Multi-Layer IPSEC Protocol. Yongguang Zhang, Bikramjit Singh |
| 2000 | A Secure Java Virtual Machine. Leendert van Doorn |
| 2000 | An Open-Source Cryptographic Coprocessor. Peter Gutmann |
| 2000 | Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor. John Scott Robin, Cynthia E. Irvine |
| 2000 | Automated Response Using System-Call Delay. Anil Somayaji, Stephanie Forrest |
| 2000 | Can Pseudonymity Really Guarantee Privacy? Josyula R. Rao, Pankaj Rohatgi |
| 2000 | CenterTrack: An IP Overlay Network for Tracking DoS Floods. Robert Stone |
| 2000 | Defeating TCP/IP Stack Fingerprinting. Matthew Smart, G. Robert Malan, Farnam Jahanian |
| 2000 | Deja Vu-A User Study: Using Images for Authentication. Rachna Dhamija, Adrian Perrig |
| 2000 | Detecting Backdoors. Yin Zhang, Vern Paxson |
| 2000 | Detecting Stepping Stones. Yin Zhang, Vern Paxson |
| 2000 | Detecting and Countering System Intrusions Using Software Wrappers. Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv |
| 2000 | Encrypting Virtual Memory. Niels Provos |
| 2000 | MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. Anurag Acharya, Mandar Raje |
| 2000 | PGP in Constrained Wireless Devices. Michael Brown, Donny Cheung, Darrel Hankerson, Julio César López-Hernández, Michael Kirkup, Alfred Menezes |
| 2000 | Probabilistic Counting of Large Digital Signature Collections. Markus G. Kuhn |
| 2000 | Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System. Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor |
| 2000 | Secure Coprocessor Integration with Kerberos V5. Naomaru Itoi |
| 2000 | Shibboleth: Private Mailing List Manager. Matt Curtin |