| 1998 | A New Public Key Cryptosystem Based on Higher Residues. David Naccache, Jacques Stern |
| 1998 | A Practical Secure Physical Random Bit Generator. Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels |
| 1998 | A Probabilistic Poly-Time Framework for Protocol Analysis. Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov |
| 1998 | A Security Architecture for Computational Grids. Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke |
| 1998 | A Specification of Java Loading and Bytecode Verification. Allen Goldberg |
| 1998 | An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. Rosario Gennaro, Daniele Micciancio, Tal Rabin |
| 1998 | Anonymity on the Internet (Panel). Paul F. Syverson |
| 1998 | Authenticated Group Key Agreement and Friends. Giuseppe Ateniese, Michael Steiner, Gene Tsudik |
| 1998 | CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998. Li Gong, Michael K. Reiter |
| 1998 | Communication Complexity of Group Key Distribution. Klaus Becker, Uta Wille |
| 1998 | Communication-Efficient Anonymous Group Identification. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano |
| 1998 | Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). Bruce Schneier, Mudge |
| 1998 | Design of a High-Performance ATM Firewall. Jun Xu, Mukesh Singhal |
| 1998 | History-Based Access Control for Mobile Code. Guy Edjlali, Anurag Acharya, Vipin Chaudhary |
| 1998 | How to Prove Where You Are: Tracking the Location of Customer Equipment. Eran Gabber, Avishai Wool |
| 1998 | Key Management for Encrypted broadcast. Avishai Wool |
| 1998 | Public-Key Cryptography and Password Protocols. Shai Halevi, Hugo Krawczyk |
| 1998 | Temporal Sequence Learning and Data Reduction for Anomaly Detection. Terran Lane, Carla E. Brodley |
| 1998 | The Design, Implementation and Operation of an Email Pseudonym Server. David Mazières, M. Frans Kaashoek |