| 1996 | A Non-Timestamped Authorization Model for Data Management Systems. Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
| 1996 | Access Control and Signatures via Quorum Secret Sharing. Moni Naor, Avishai Wool |
| 1996 | An Advanced Commit Protocol for MLS Distributed Database Systems. Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini |
| 1996 | An Approach to the Formal Verification of Cryptographic Protocols. Dominique Bolignano |
| 1996 | An Authentication Logic Supporting Synchronization, Revocation, and Recency. Stuart G. Stubblebine, Rebecca N. Wright |
| 1996 | An Efficient Fair Payment System. Jan Camenisch, Jean-Marc Piveteau, Markus Stadler |
| 1996 | An Experiment on DES Statistical Cryptanalysis. Serge Vaudenay |
| 1996 | Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. David M'Raïhi, David Naccache |
| 1996 | Breaking and Repairing a Convertible Undeniable Signature Scheme. Markus Michels, Holger Petersen, Patrick Horster |
| 1996 | CCS '96, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996. Li Gong, Jacques Stearn |
| 1996 | Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. Hung-Min Sun, Shiuh-Pyng Shieh |
| 1996 | Diffie-Hellman Key Distribution Extended to Group Communication. Michael Steiner, Gene Tsudik, Michael Waidner |
| 1996 | Human-Computer Cryptography: An Attempt. Tsutomu Matsumoto |
| 1996 | Proxy Signatures for Delegating Signing Operation. Masahiro Mambo, Keisuke Usuda, Eiji Okamoto |
| 1996 | Revokable and Versatile Electronic Money (extended abstract). Markus Jakobsson, Moti Yung |
| 1996 | Secure External References in Multimedia Email Messages. Burkhard Wiegel |
| 1996 | Securing ATM Networks. Shaw-Cheng Chuang |
| 1996 | Several Secure Store and Forward Devices. David M. Goldschlag |
| 1996 | The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung |
| 1996 | The Omega Key Management Service. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright |
| 1996 | Unified Login with Pluggable Authentication Modules (PAM). Vipin Samar |