| Number | Name | Paper |
| 1 | MACNESS, JOSEPH RODNEY ARNOLD | Cohen, Operating System Protection Through Program Evolution |
| 3 | LI, JIHONG | Margrave, GSM Security and Encryption |
| 4 | YIP, HO YEE | Garcia-Molina & Shivakumar, Safeguarding & Charging for Information on the Internet |
| 5 | DONG, QIANG | Bellare et al, Design [of an] Electronic Payment System |
| 6 | VON RANDOW, KARL | Proebsting & Watterson, Krakatoa: Decompilation in Java |
| 7 | YU, GUANGLUN | LaDue, The Maginot License |
| 8 | LEVINE, DANIEL | |
| 9 | PEPER, DENNIS | Shivakumar & Garcia-Molina, SCAM: A Copy Protection System for Digital Documents |
| 10 | CHEN, YE | Rubin & Geer, Survey of Web Security |
| 11 | MCCRACKEN, SHANNON WILLIAM | Shore, H.323 and Firewalls |
| 12 | LAI, HONGYING | Collberg et al, Breaking Abstractions |
| 13 | PAN, RUOBING | Chess, Security Issues in Mobile Code Systems |
| 14 | LIU, CHONGJIAN | Johnson & Jojodia, Exploring Steganography |
| 15 | DONG, JIAN JUN | Neuman & T'so, Kerberos |
| 16 | SHADABI, FARIBA | Matheson et al, Robustness & Security of Digital Watermarks |
| 17 | HE, YONG | Palsberg et al, Experience with Software Watermarking |
| 18 | XU, PING | Mori & Kawahara, Superdistribution |
| 19 | COGHILL, COLIN BLAIR | Baker et al, RSVP Cryptographic Authentication |
| 20 | HUANG, JI | Baker & Manber, Deducing Similarities in Java Sources from Bytecodes |
| 21 | PAXIE, ANDREW LESLIE | Aucsmith, Tamper Resistant Software |
| 22 | CAI, YUHONG | Dean et al, Java Security |
| 23 | WATERS, DAVID NEAL | Wallach et al, Extensible Security Architectures for Java |
| 24 | LAM, PATRICK | Gong et al, Signing, Sealing & Guarding Java Objects |
| 25 | WANG, XIAO | Hauser, Using the Internet to Decrease Software Piracy |
| 26 | ZHOU, NIAN | Collberg & Thomborson, Software Watermarking |
| 27 | DENG, GUOYU | Ousterhout et al, Safe-Tcl Security Model |
| 28 | ROSIE, KATHERINE JANE | Thompson, Reflections on Trusting Trust |
| 29 | NOBLE, MARK ANTHONY | Maude & Maude, Hardware Protection against Software Piracy |
| 30 | LEE, SEUNG JUN | Simmel & Godard, Metering & Licensing of Resources: Kala's General Purpose Approach |
| 31 | CHAN, CONNIE NAM NAM | Cifuentes & Gough, Decompilation of Binary Programs |