| 1999 | An Extended Logic for Analyzing Timed-Release Public-Key Protocols. Michiharu Kudo, Anish Mathuria |
| 1999 | Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. Constantinos Markantonakis |
| 1999 | Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. Montse Rubia, Juan Carlos Cruellas, Manuel Medina |
| 1999 | Cryptanalysis of some AES Candidate Algorithms. Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing |
| 1999 | Delegation Chains Secure up to Constant Length. Masayuki Abe, Tatsuaki Okamoto |
| 1999 | Detachable Electronic Coins. Chris Pavlovski, Colin Boyd, Ernest Foo |
| 1999 | Efficient Accumulators without Trapdoor Extended Abstracts. Tomas Sander |
| 1999 | Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. Fabrice Boudot, Jacques Traoré |
| 1999 | Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. Shoichi Hirose, Kanta Matsuura |
| 1999 | Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. William Millan, L. Burnett, Gary Carter, Andrew J. Clark, Ed Dawson |
| 1999 | Extending ERLANG for Safe Mobile Code Execution. Lawrie Brown, Dan Sahlin |
| 1999 | Incremental Authentication of Tree-Structured Documents. Patrik Ekdahl, Ben J. M. Smeets |
| 1999 | Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Vijay Varadharajan, Yi Mu |
| 1999 | International Cryptography (Abstract). Doug McGowan |
| 1999 | Issues in the Design of a Language for Role Based Access Control. Michael Hitchens, Vijay Varadharajan |
| 1999 | Linear Secret Sharing with Divisible Shares. Josef Pieprzyk |
| 1999 | On the Channel Capacity of Narrow-Band Subliminal Channels. Kazukuni Kobara, Hideki Imai |
| 1999 | On the Cryptographic Value of The q Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann |
| 1999 | On the Linear Complexity of the Naor-Reingold Pseudo-Random Function. Frances Griffin, Igor E. Shparlinski |
| 1999 | Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai |
| 1999 | Plateaued Functions. Yuliang Zheng, Xian-Mo Zhang |
| 1999 | Protecting Critical Information Systems (Abstract). Sushil Jajodia |
| 1999 | Reaction Attacks against several Public-Key Cryptosystems. Chris Hall, Ian Goldberg, Bruce Schneier |
| 1999 | Send Message into a Definite Future. Wenbo Mao |
| 1999 | Signature Scheme for Controlled Environments. Kapali Viswanathan, Colin Boyd, Ed Dawson |
| 1999 | User Identification System Based on Biometrics for Keystroke. Kazumasa Omote, Eiji Okamoto |
| 1999 | Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan |