| 1996 | 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA |
| 1996 | A Case Study Of Two Nrl Pump Prototypes. Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese |
| 1996 | A Comparison of Multilevel Structured Query Language (SQL) Implementations. Rae K. Burns, Yi-Fang Koh |
| 1996 | A Modular Covert Channel Analysis Methodology for Trusted DG/UX Richard A. Kemmerer, Tad Taylor |
| 1996 | A Role-Based Secure Database Design Tool. Luigi Giuri, Pietro Iglio |
| 1996 | An Authenticated Camera. John Kelsey, Bruce Schneier, Chris Hall |
| 1996 | An Evaluation of the Java Security Model. Andreas Sterbenz |
| 1996 | An Extended Capability Architecture To Enforce Dynamic Access Control Policies. I-Lung Kao, Randy Chow |
| 1996 | Asymmetric Isolation. John A. Davidson |
| 1996 | Case-Based Reasoning for Intrusion Detection. Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk |
| 1996 | Common Criteria Activities and Alternative Assurance. Herve Hosy, Mary Schanken |
| 1996 | Formal Techniques for an ITSEC-E4 Secure Gateway. Pierre Bieber |
| 1996 | Implementing Security Policy in a Large Defense Procurement. M. Nash, R. J. Kennett |
| 1996 | Innovative Secure Payments On The Internet Using The German Electronic Purse. Brigitte Althen, Gerd Enste, Brigitte Nebelung |
| 1996 | Major Questions in Applying the SSE-CMM. Joel E. Sachs |
| 1996 | Mandatory Protection for Internet Server Software. Richard E. Smith |
| 1996 | On The Design Of Secure Electronic Payment Schemes For Internet. Vijay Varadharajan, Yi Mu |
| 1996 | Operation chain link: the deployment of a firewall at Hanscom Air Force Base. Julie L. Connolly |
| 1996 | Proxies For Anonymous Routing. Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
| 1996 | SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. E. John Sebes, Terry C. Vickers Benzel |
| 1996 | SSE-CMM Pilot Results. Mary Schanken |
| 1996 | Security Issues in an EDI Environment. Ning Zhang, Qi Shi |
| 1996 | Security Measures For The Austrian "Paychip" Electronic Purse Application. Manfred Holzbach |
| 1996 | Security and the National Telecommunications Infrastructure. Teresa F. Lunt, John Kimmins, Bob McKosky |
| 1996 | Starlight: Interactive Link. Mark S. Anderson, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John D. Yesberg, Kenneth Kwok-Hei Yiu |
| 1996 | Using Fortezza For Transparent File Encryption. Jeremy Epstein, Tim Williams |
| 1996 | Using a Proxy X Server to Facilitate COTS Application Integration. Eric M. Kayden |
| 1996 | Verifying The Correctness Of Cryptographic Protocols Using "Convince". Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
| 1996 | esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Michael Hitchens, Vijay Varadharajan |