| 1999 | A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. Pankaj Rohatgi |
| 1999 | A Fuzzy Commitment Scheme. Ari Juels, Martin Wattenberg |
| 1999 | A High-Performance Network Intrusion Detection System. R. Sekar, Y. Guang, S. Verma, T. Shanbhag |
| 1999 | Anonymous Authentication with Subset Queries (extended abstract). Dan Boneh, Matthew K. Franklin |
| 1999 | CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999. Juzar Motiwalla, Gene Tsudik |
| 1999 | Efficient Private Bidding and Auctions with an Oblivious Third Party. Christian Cachin |
| 1999 | Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. Giuseppe Ateniese |
| 1999 | On the Fly Signatures Based on Factoring. Guillaume Poupard, Jacques Stern |
| 1999 | Password Hardening Based on Keystroke Dynamics. Fabian Monrose, Michael K. Reiter, Susanne Wetzel |
| 1999 | Proof-Carrying Authentication. Andrew W. Appel, Edward W. Felten |
| 1999 | Public-Key Cryptography and Password Protocols: The Multi-User Case. Maurizio Kliban Boyarsky |
| 1999 | Scalable Multicast Security in Dynamic Groups. Refik Molva, Alain Pannetrat |
| 1999 | Secure Protocol Transformation via "Expansion": From Two-Party to Groups. Alain J. Mayer, Moti Yung |
| 1999 | Signature Schemes Based on the Strong RSA Assumption. Ronald Cramer, Victor Shoup |
| 1999 | The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. Stefan Axelsson |
| 1999 | The Proactive Security Toolkit and Applications. Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai |
| 1999 | Using Smartcards to Secure a Personalized Gambling Device. William Aiello, Aviel D. Rubin, Martin Strauss |