| 1999 | A Real-World Analysis of Kerberos Password Security. Thomas D. Wu |
| 1999 | Addressing the Problem of Undetected Signature Key Compromise. Mike Just, Paul C. van Oorschot |
| 1999 | An Algebra for Assessing Trust in Certification Chains. Audun Jøsang |
| 1999 | Arguments Against IPSEC. Bob Braden |
| 1999 | BGP Origin Authentication. Tony Li |
| 1999 | BGP Vulnerabilities and Security Options. Sandra L. Murphy |
| 1999 | Benefits of IPsec. Rodney Thayer |
| 1999 | Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. Ari Juels, John G. Brainard |
| 1999 | Distributed Execution with Remote Audit. Fabian Monrose, Peter Wyckoff, Aviel D. Rubin |
| 1999 | Distributed Policy Management for JDK 1.2. Pekka Nikander, Jonna Partanen |
| 1999 | Experimenting with Shared Generation of RSA Keys. Michael Malkin, Thomas D. Wu, Dan Boneh |
| 1999 | Improving Internet Routing Robustness. Curtis Villamizer |
| 1999 | PGRIP: PNNI Global Routing Infrastructure Protection. Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati |
| 1999 | Perspectives on Progress and Directions for Network Security Research. Hilarie K. Orman |
| 1999 | Practical Approach to Anonymity in Large Scale Electronic Voting Schemes. Andreu Riera, Joan Borrell |
| 1999 | Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA |
| 1999 | R&D Challenges: Notes from the "Trust in Cyberspace" Report. Stephen T. Kent |
| 1999 | Secure Border Gateway Protocol (S-BGP). Charles Lynn |
| 1999 | Secure Password-Based Protocol for Downloading a Private Key. Radia J. Perlman, Charlie Kaufman |
| 1999 | Secure Remote Access to an Internal Web Server. Christian Gilmore, David P. Kormann, Aviel D. Rubin |
| 1999 | Transport-Friendly ESP. Steven M. Bellovin |
| 1999 | Usability and Security. Mark S. Ackerman |
| 1999 | User-Centered Security. Mary Ellen Zurko |
| 1999 | Why Do We Need More Research? Steven M. Bellovin |