| 1993 | A Cryptographic File System for UNIX. Matt Blaze |
| 1993 | A Framework for Distributed Authorization. Thomas Y. C. Woo, Simon S. Lam |
| 1993 | A New Signature Scheme Based on the DSA Giving Message Recovery. Kaisa Nyberg, Rainer A. Rueppel |
| 1993 | A Particular Solution to Provide Secure Communications in an Ethernet Environment. Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús |
| 1993 | A Pump for Rapid, Reliable, Secure Communication. Myong H. Kang, Ira S. Moskowitz |
| 1993 | Adding Time to a Logic of Authentication. Paul F. Syverson |
| 1993 | Analysis of an Algorithm for Distributed Recognition and Accountability. Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee |
| 1993 | Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. Steven M. Bellovin, Michael Merritt |
| 1993 | Authorizations in Relational Database Management Systems. Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
| 1993 | CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993. Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby |
| 1993 | Cryptanalysis and Protocol Failures (abstract). Gustavus J. Simmons |
| 1993 | Denial of Service. Roger M. Needham |
| 1993 | Design of the Commercial Data Masking Facility Data Privacy Algorithm. Don B. Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins |
| 1993 | Differential Cryptanalysis of Hash Functions Based on Block Ciphers. Bart Preneel, René Govaerts, Joos Vandewalle |
| 1993 | Digital Signatures: Can They be Accepted as Legal Signatures in EDI? Patrick W. Brown |
| 1993 | Does Licensing Require New Access Control Techniques? Ralf C. Hauser |
| 1993 | Extending Cryptographic Logics of Belief to Key Agreement Protocols. Paul C. van Oorschot |
| 1993 | High Assurance Discretionary Access Control for Object Bases. Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
| 1993 | Integration of DCE and Local Registries: Design Approaches. Ping Lin, C. Sekar Chandersekaran |
| 1993 | Lower Bounds on Messages and Rounds for Network Authentication Protocols. Li Gong |
| 1993 | NetCash: A Design for Practical Electronic Currency on the Internet. Gennady Medvinsky, B. Clifford Neuman |
| 1993 | On Simple and Secure Key Distribution. Gene Tsudik, Els Van Herreweghen |
| 1993 | Optimality of Multi-Domain Protocols. Raphael Yahalom |
| 1993 | Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. Mihir Bellare, Phillip Rogaway |
| 1993 | Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks. Hank M. Kluepfel |
| 1993 | Security Planning for Personal Communications. Dan Brown |
| 1993 | Sorting Out Signature Schemes. Birgit Pfitzmann |
| 1993 | Systematic Generation of Cryptographically Robust S-Boxes. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng |
| 1993 | Towards Practical "Proven Secure" Authenticated Key Distribution. Yvo Desmedt, Mike Burmester |
| 1993 | Verifiable Secret Sharing for Monotone Access Structures. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten |
| 1993 | Why Cryptosystems Fail. Ross J. Anderson |