| 1996 | A Framework for Building an Electronic Currency System. Lei Tang |
| 1996 | A Revocable Backup System. Dan Boneh, Richard J. Lipton |
| 1996 | A Secure Environment for Untrusted Helper Applications. Ian Goldberg, David A. Wagner, Randi Thomas, Eric A. Brewer |
| 1996 | Building Systems That Flexibly Download Executable Content. Trent Jaeger, Atul Prakash |
| 1996 | Chrg-http: A Tool for Micropayments on the World Wide Web. Steven H. Low |
| 1996 | Compliance Defects in Public Key Cryptography. Don Davis |
| 1996 | Confining Root Programs with Domain and Type Enforcement. Kenneth M. Walker, Daniel F. Sterne, Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp |
| 1996 | Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks. Barry Jaspan |
| 1996 | Murphy's Law and Computer Security. Wietse Z. Venema |
| 1996 | NetKuang - A Multi-Host Configuration Vulnerability Checker. Dan Zerkle, Karl N. Levitt |
| 1996 | Problem Areas for the IP Security Protocols. Steven M. Bellovin |
| 1996 | Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996 |
| 1996 | Public Key Distribution with Secure DNS. James M. Galvin |
| 1996 | Texas A&M University Anarchistic Key Authorization (AKA). David Safford, Douglas Lee Schales, David K. Hess |