Conferences in DBLP
Virgil D. Gligor Emergent properties in ad-hoc networks: a security perspective. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:1- [Conf ] Ravi S. Sandhu , Kumar Ranganathan , Xinwen Zhang Secure information sharing enabled by Trusted Computing and PEI models. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:2-12 [Conf ] Shankar Sastry TRUST: in cyberspace and beyond. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:13- [Conf ] Jeannette M. Wing Attack graph generation and analysis. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:14- [Conf ] Ravishankar K. Iyer Security vulnerabilities: from measurements to design. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:15- [Conf ] Marco Barreno , Blaine Nelson , Russell Sears , Anthony D. Joseph , J. D. Tygar Can machine learning be secure? [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:16-25 [Conf ] Claude Castelluccia , Einar Mykletun , Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:26-34 [Conf ] Michel Abdalla , Emmanuel Bresson , Olivier Chevassut , Bodo Möller , David Pointcheval Provably secure password-based authentication in TLS. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:35-45 [Conf ] Himanshu Khurana , Hyung-Seok Hahm Certified mailing lists. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:46-58 [Conf ] Ching Yu Ng , Willy Susilo , Yi Mu Designated group credentials. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:59-65 [Conf ] Prasenjit Mitra , Chi-Chun Pan , Peng Liu , Vijayalakshmi Atluri Privacy-preserving semantic interoperation and access control of heterogeneous databases. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:66-77 [Conf ] Yingjiu Li , Robert Huijie Deng Publicly verifiable ownership protection for relational databases. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:78-89 [Conf ] Guofei Gu , Prahlad Fogla , David Dagon , Wenke Lee , Boris Skoric Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:90-101 [Conf ] Jouni Viinikka , Hervé Debar , Ludovic Mé , Renaud Séguier Time series modeling for IDS alert management. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:102-113 [Conf ] Ashish Gehani , Surendar Chandra , Gershon Kedem Augmenting storage with an intrusion response primitive to ensure the security of critical data. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:114-124 [Conf ] David Brumley , Li-Hao Liu , Pongsin Poosankam , Dawn Xiaodong Song Design space and analysis of worm defense strategies. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:125-137 [Conf ] Ling Luo , Reihaneh Safavi-Naini , Joonsang Baek , Willy Susilo Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:138-147 [Conf ] Ya-Jeng Lin , Shiuhpyng Shieh , Warren W. Lin Lightweight, pollution-attack resistant multicast authentication scheme. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:148-156 [Conf ] Gaurav Gupta , Josef Pieprzyk , Huaxiong Wang An attack-localizing watermarking scheme for natural language documents. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:157-165 [Conf ] Soo-Chang Pei , Yi-Chong Zeng Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:166-174 [Conf ] Xinshan Zhu , Yong Gao 0002 , Yan Zhu Image-adaptive watermarking based on perceptually shaping watermark blockwise. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:175-181 [Conf ] Ee-Chien Chang , Ren Shen , Francis Weijian Teo Finding the original point set hidden among chaff. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:182-188 [Conf ] Juan A. Garay , Lorenz Huelsbergen Software integrity protection using timed executable agents. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:189-200 [Conf ] Manigandan Radhakrishnan , Jon A. Solworth Application security support in the operating system kernel. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:201-211 [Conf ] Claudio Agostino Ardagna , Marco Cremonini , Ernesto Damiani , Sabrina De Capitani di Vimercati , Pierangela Samarati Supporting location-based conditions in access control policies. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:212-222 [Conf ] Wen-Guey Tzeng A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:223-230 [Conf ] Jon A. Solworth Approvability. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:231-242 [Conf ] Xinwen Zhang , Ravi S. Sandhu , Francesco Parisi-Presicce Safety analysis of usage control authorization models. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:243-254 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Fortifying password authentication in integrated healthcare delivery systems. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:255-265 [Conf ] Yan Zhu , Wei Zou , Xinshan Zhu Collusion secure convolutional fingerprinting information codes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:266-274 [Conf ] S. Anand , Gurumurthi V. Ramanan Periodicity, complementarity and complexity of 2-adic FCSR combiner generators. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:275-282 [Conf ] Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:283-288 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Antonio Durante , Vishwas Patil Addressing the shortcomings of one-way chains. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:289-296 [Conf ] Sherman S. M. Chow , Victor K.-W. Wei , Joseph K. Liu , Tsz Hon Yuen Ring signatures without random oracles. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:297-302 [Conf ] Erik-Oliver Blaß , Martina Zitterbart An efficient key establishment scheme for secure aggregating sensor networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:303-310 [Conf ] Shang-Ming Chang , Shiuhpyng Shieh , Warren W. Lin , Chih-Ming Hsieh An efficient broadcast authentication scheme in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:311-320 [Conf ] E-yong Kim , Klara Nahrstedt , Li Xiao , Kunsoo Park Identity-based registry for secure interdomain routing. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:321-331 [Conf ] Hazem Hamed , Ehab Al-Shaer Dynamic rule-ordering optimization for high-speed firewall filtering. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:332-342 [Conf ] Kunihiko Miyazaki , Goichiro Hanaoka , Hideki Imai Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:343-354 [Conf ] Chun-Hsiang Huang , Yu-Feng Kuo , Ja-Ling Wu Digital invisible ink: revealing true secrets via attacking. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:355- [Conf ] Shan Ming Tsu , W. S. Hsieh Quadtree based perceptual watermarking scheme. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:356- [Conf ] Jun Li , Wei-Yun Yau , Han Wang Continuous fingerprints classification by symmetrical filters. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:357- [Conf ] Masayuki Nakae , Xinwen Zhang , Ravi S. Sandhu A general design towards secure ad-hoc collaboration. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:358- [Conf ] Chun-Ying Huang , Yun-Peng Chiu , Kuan-Ta Chen , Chin-Laung Lei A distributed key assignment protocol for secure multicast based on proxy cryptography. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:359- [Conf ] Jiun-Tze Lai , Ting-Wei Hou An efficient secure communication between set-top box and smart card in DTV broadcasting. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:360- [Conf ] Chuan Chi Wang , Min-Chih Kao , Yi-Shiung Yeh Forgery attack on the RPC incremental unforgeable encryption scheme. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:361- [Conf ] Y. L. Huang , F. S. Ho , H. Y. Tsai , H. M. Kao A control flow obfuscation method to discourage malicious tampering of software codes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:362- [Conf ] Masahiro Mambo , Moises Rosales Salinas , Kazuo Ohta , Noboru Kunihiro Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:363- [Conf ] Kuen-Cheng Chiang , Zhi-Wei Chen , Jean Jyh-Jiun Shann Design and implementation of a reconfigurable hardware for secure embedded systems. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:364- [Conf ] Mark Manulis Democratic group signatures: on an example of joint ventures. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:365- [Conf ] Lin-Chuan Wu Analysis of traceability attack on Camenisch et al.'s blind signature schemes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:366- [Conf ] Toshihiko Matsuo Restricted message signing. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:367- [Conf ] Walid Bagga , Refik Molva , Stefano Crosta Policy-based encryption schemes from bilinear pairings. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:368- [Conf ] Michael Neve , Jean-Pierre Seifert , Zhenghong Wang A refined look at Bernstein's AES side-channel analysis. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:369- [Conf ]