| 1995 | A Domain and Type Enforcement UNIX Prototype. Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat |
| 1995 | A Simple Active Attack Against TCP. Laurent Joncheray |
| 1995 | An Architecture for Advanced Packet Filtering and Access Policy. Andrew Molitor |
| 1995 | DNS and BIND Security Issues. Paul Vixie |
| 1995 | Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk |
| 1995 | File-Based Network Collaboration System. Toshinari Takahashi, Atsushi Shimbo, Masao Murota |
| 1995 | Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol. Gene H. Kim, Hilarie K. Orman, Sean W. O'Malley |
| 1995 | Improving the Trustworthiness of Evidence Derived from Security Trace Files. Ennio Pozzetti, Vidar Vetland |
| 1995 | Independent One-Time Passwords. Aviel D. Rubin |
| 1995 | Information Security Technology? Don't Rely on It. A Case Study in Social Engineering. Ira S. Winkler, Brian Dealy |
| 1995 | Joining Security Realms: A Single Login for NetWare and Kerberos. William A. Adamson, Jim Rees, Peter Honeyman |
| 1995 | Kerberos Security with Clocks Adrift. Don Davis, Daniel E. Geer Jr. |
| 1995 | Keynote Address: Why are our Systems Insecure? Must they always be? Stephen T. Walker |
| 1995 | MIME Object Security Services: Issues in a Multi-User Environment. James M. Galvin, Mark Feldman |
| 1995 | Network Randomization Protocol: A Proactive Pseudo-Random Generator. Chee-Seng Chow, Amir Herzberg |
| 1995 | One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication. Daniel L. McDonald, Randall J. Atkinson, Craig Metz |
| 1995 | Proceedings of the 5th USENIX Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995 Frederick M. Avolio, Steven M. Bellovin |
| 1995 | Providing Policy Control Over Object Operations in a Mach-Based System. Spencer E. Minear |
| 1995 | STEL: Secure TELnet. David Vincenzetti, Stefano Taino, Fabio Bolognesi |
| 1995 | Safe Use of X Window System Protocol Across a Firewall. Brian L. Kahn |
| 1995 | Session-Layer Encryption. Matt Blaze, Steven M. Bellovin |
| 1995 | Using the Domain Name System for System Break-ins. Steven M. Bellovin |
| 1995 | WAN-hacking with AutoHack: Auditing Security Behind the Firewall. Alec Muffett |