| 1998 | A Flexible Method for Information System Security Policy Specification. Rodolphe Ortalo |
| 1998 | A Kernelized Architecture for Multilevel Secure Application Policies. Simon N. Foley |
| 1998 | A Mix-Mediated Anonymity Service and Its Payment. Elke Franz, Anja Jerichow |
| 1998 | A Sound Logic for Analysing Electronic Commerce Protocols. Volker Kessler, Heike Neumann |
| 1998 | A Subjective Metric of Authentication. Audun Jøsang |
| 1998 | A Tool for Pro-active Defense Against the Buffer Overrun Attack. Danilo Bruschi, Emilia Rosti, R. Banfi |
| 1998 | An Authorization Model and Its Formal Semantics. Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo |
| 1998 | Authentication and Payment in Future Mobile Systems. Günther Horn, Bart Preneel |
| 1998 | Authorization in CORBA Security. Günter Karjoth |
| 1998 | Byte Code Verification for Java Smart Card Based on Model Checking. Joachim Posegga, Harald Vogt |
| 1998 | Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
| 1998 | DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. Daniel Augot, Jean-François Delaigle, Caroline Fontaine |
| 1998 | Dealing with Multi-policy Security in Large Open Distributed Systems. Christophe Bidan, Valérie Issarny |
| 1998 | Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen |
| 1998 | EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh |
| 1998 | Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi |
| 1998 | Kerberos Version 4: Inductive Analysis of the Secrecy Goals. Giampaolo Bella, Lawrence C. Paulson |
| 1998 | MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video. Jean-Paul M. G. Linnartz, Joop Talstra |
| 1998 | On the Security of Digital Tachographs. Ross J. Anderson |
| 1998 | On the Security of Some Variants of the RSA Signature Scheme. Markus Michels, Markus Stadler, Hung-Min Sun |
| 1998 | Panel Session: Watermarking. Gérard Eizenberg, Jean-Jacques Quisquater |
| 1998 | Rules for Designing Multilevel Object-Oriented Databases. Frédéric Cuppens, Alban Gabillon |
| 1998 | Side Channel Cryptanalysis of Product Ciphers. John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall |
| 1998 | The "Ticket" Concept for Copy Control Based on Embedded Signalling. Jean-Paul M. G. Linnartz |
| 1998 | Towards Formalizing the Java Security Architecture of JDK 1.2. Lora Kassab, Steven J. Greenwald |