| 1996 | A Multilevel Security Model for Distributed Object Systems. Vincent Nicomette, Yves Deswarte |
| 1996 | An Authorization Model for Federated Systems. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 1996 | An Authorization Model for Workflows. Vijayalakshmi Atluri, Wei-kuang Huang |
| 1996 | Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. Catherine A. Meadows |
| 1996 | Authors' Rights and Copyright Protection. Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater |
| 1996 | CSP and Anonymity. Steve A. Schneider, Abraham Sidiropoulos |
| 1996 | Certified Electronic Mail. Jianying Zhou, Dieter Gollmann |
| 1996 | Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo |
| 1996 | Development of a Secure Electronic Marketplace for Europe. Michael Waidner |
| 1996 | Digital Payment Systems with Passive Anonymity-Revoking Trustees. Jan Camenisch, Ueli M. Maurer, Markus Stadler |
| 1996 | Distributed Proctoring. Bruce Schneier, John Kelsey, Jay Walker |
| 1996 | Enhancing the Controlled Disclosure of Sensitive Information. Donald G. Marks, Amihai Motro, Sushil Jajodia |
| 1996 | Formal Semantics for Authentication Logics. Gabriele Wedel, Volker Kessler |
| 1996 | Light-Weight Micro-cash Payment for the Internet. Wenbo Mao |
| 1996 | Limitations of the Approach of Solving a Network's Security Problem with a Firewall. Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth |
| 1996 | Merging Heterogeneous Security Orderings. Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian |
| 1996 | Modelling a Public-Key Infrastructure. Ueli M. Maurer |
| 1996 | Role Hierarchies and Constraints for Lattice-Based Access Controls. Ravi S. Sandhu |
| 1996 | Secure Concurrency Control in MLS Databases with Two Versions of Data. Luigi V. Mancini, Indrajit Ray |
| 1996 | Security for Mobile Agents: Authentication and State Appraisal. William M. Farmer, Joshua D. Guttman, Vipin Swarup |
| 1996 | Server-Supported Signatures. N. Asokan, Gene Tsudik, Michael Waidner |
| 1996 | Sleepy Network-Layer Authentication Service for IPSEC. Shyhtsun Felix Wu |
| 1996 | The Impact of Multilevel Security on Database Buffer Management. Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal |
| 1996 | Threat Scenarios as a Means to Formally Develop Secure Systems. Volkmar Lotz |