| 1998 | An Intermediate System's View of IPSEC. Cheryl Madson |
| 1998 | Attack Detection Methods for All-Optical Networks. Muriel Médard, Douglas Marquis, Stephen R. Chinn |
| 1998 | Automated Recovery in a Secure Bootstrap Process. William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith |
| 1998 | Credential Management and Secure Single Login for SPKM. Detlef Hühnlein |
| 1998 | Distributed Algorithms for Attack Localization in All-Optical Networks. Ruth Bergman, Muriel Médard, Serena Chan |
| 1998 | Efficient Protocols for Signing Routing Messages. Kan Zhang |
| 1998 | Enabling the Internet White Pages Service - the Directory Guardian. David W. Chadwick, Andrew J. Young |
| 1998 | Implementation Issues for E-Commerce. B. Clifford Neuman |
| 1998 | Implementing Protection Domains in the Java Li Gong, Roland Schemers |
| 1998 | Le Nozze di Nomen. Bob Blakley |
| 1998 | Live Traffic Analysis of TCP/IP Gateways. Phillip A. Porras, Alfonso Valdes |
| 1998 | Lucent's Entry Into Network Security. Howard M. Gittleson |
| 1998 | On the Problem of Trust in Mobile Agent Systems. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán |
| 1998 | Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA |
| 1998 | Some Timestamping Protocol Failures. Mike Just |
| 1998 | Some Tips. Donald E. Eastlake III |
| 1998 | The Multilayer Firewall. Dan M. Nessett, Polar Humenn |
| 1998 | The Secure Remote Password Protocol. Thomas D. Wu |
| 1998 | Trust Management and Internet Client Security. Blair Dillaway |
| 1998 | VPN and IPsec. Naganand Doraswamy |
| 1998 | Weak links in e-commerce security: examples from the field. Gary McGraw |
| 1998 | What Will Probably Happen. Dan McDonald |