The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2006 (conf/ccs/2006)

  1. Virgil D. Gligor
    Emergent properties in ad-hoc networks: a security perspective. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:1- [Conf]
  2. Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
    Secure information sharing enabled by Trusted Computing and PEI models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:2-12 [Conf]
  3. Shankar Sastry
    TRUST: in cyberspace and beyond. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:13- [Conf]
  4. Jeannette M. Wing
    Attack graph generation and analysis. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:14- [Conf]
  5. Ravishankar K. Iyer
    Security vulnerabilities: from measurements to design. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:15- [Conf]
  6. Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar
    Can machine learning be secure? [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:16-25 [Conf]
  7. Claude Castelluccia, Einar Mykletun, Gene Tsudik
    Improving secure server performance by re-balancing SSL/TLS handshakes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:26-34 [Conf]
  8. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
    Provably secure password-based authentication in TLS. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:35-45 [Conf]
  9. Himanshu Khurana, Hyung-Seok Hahm
    Certified mailing lists. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:46-58 [Conf]
  10. Ching Yu Ng, Willy Susilo, Yi Mu
    Designated group credentials. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:59-65 [Conf]
  11. Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri
    Privacy-preserving semantic interoperation and access control of heterogeneous databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:66-77 [Conf]
  12. Yingjiu Li, Robert Huijie Deng
    Publicly verifiable ownership protection for relational databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:78-89 [Conf]
  13. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:90-101 [Conf]
  14. Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier
    Time series modeling for IDS alert management. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:102-113 [Conf]
  15. Ashish Gehani, Surendar Chandra, Gershon Kedem
    Augmenting storage with an intrusion response primitive to ensure the security of critical data. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:114-124 [Conf]
  16. David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song
    Design space and analysis of worm defense strategies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:125-137 [Conf]
  17. Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
    Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:138-147 [Conf]
  18. Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
    Lightweight, pollution-attack resistant multicast authentication scheme. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:148-156 [Conf]
  19. Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang
    An attack-localizing watermarking scheme for natural language documents. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:157-165 [Conf]
  20. Soo-Chang Pei, Yi-Chong Zeng
    Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:166-174 [Conf]
  21. Xinshan Zhu, Yong Gao 0002, Yan Zhu
    Image-adaptive watermarking based on perceptually shaping watermark blockwise. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:175-181 [Conf]
  22. Ee-Chien Chang, Ren Shen, Francis Weijian Teo
    Finding the original point set hidden among chaff. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:182-188 [Conf]
  23. Juan A. Garay, Lorenz Huelsbergen
    Software integrity protection using timed executable agents. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:189-200 [Conf]
  24. Manigandan Radhakrishnan, Jon A. Solworth
    Application security support in the operating system kernel. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:201-211 [Conf]
  25. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Supporting location-based conditions in access control policies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:212-222 [Conf]
  26. Wen-Guey Tzeng
    A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:223-230 [Conf]
  27. Jon A. Solworth
    Approvability. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:231-242 [Conf]
  28. Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce
    Safety analysis of usage control authorization models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:243-254 [Conf]
  29. Yanjiang Yang, Robert H. Deng, Feng Bao
    Fortifying password authentication in integrated healthcare delivery systems. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:255-265 [Conf]
  30. Yan Zhu, Wei Zou, Xinshan Zhu
    Collusion secure convolutional fingerprinting information codes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:266-274 [Conf]
  31. S. Anand, Gurumurthi V. Ramanan
    Periodicity, complementarity and complexity of 2-adic FCSR combiner generators. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:275-282 [Conf]
  32. Alexander Maximov
    Cryptanalysis of the "Grain" family of stream ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:283-288 [Conf]
  33. Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil
    Addressing the shortcomings of one-way chains. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:289-296 [Conf]
  34. Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen
    Ring signatures without random oracles. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:297-302 [Conf]
  35. Erik-Oliver Blaß, Martina Zitterbart
    An efficient key establishment scheme for secure aggregating sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:303-310 [Conf]
  36. Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh
    An efficient broadcast authentication scheme in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:311-320 [Conf]
  37. E-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park
    Identity-based registry for secure interdomain routing. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:321-331 [Conf]
  38. Hazem Hamed, Ehab Al-Shaer
    Dynamic rule-ordering optimization for high-speed firewall filtering. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:332-342 [Conf]
  39. Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai
    Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:343-354 [Conf]
  40. Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu
    Digital invisible ink: revealing true secrets via attacking. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:355- [Conf]
  41. Shan Ming Tsu, W. S. Hsieh
    Quadtree based perceptual watermarking scheme. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:356- [Conf]
  42. Jun Li, Wei-Yun Yau, Han Wang
    Continuous fingerprints classification by symmetrical filters. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:357- [Conf]
  43. Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu
    A general design towards secure ad-hoc collaboration. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:358- [Conf]
  44. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
    A distributed key assignment protocol for secure multicast based on proxy cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:359- [Conf]
  45. Jiun-Tze Lai, Ting-Wei Hou
    An efficient secure communication between set-top box and smart card in DTV broadcasting. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:360- [Conf]
  46. Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh
    Forgery attack on the RPC incremental unforgeable encryption scheme. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:361- [Conf]
  47. Y. L. Huang, F. S. Ho, H. Y. Tsai, H. M. Kao
    A control flow obfuscation method to discourage malicious tampering of software codes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:362- [Conf]
  48. Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro
    Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:363- [Conf]
  49. Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann
    Design and implementation of a reconfigurable hardware for secure embedded systems. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:364- [Conf]
  50. Mark Manulis
    Democratic group signatures: on an example of joint ventures. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:365- [Conf]
  51. Lin-Chuan Wu
    Analysis of traceability attack on Camenisch et al.'s blind signature schemes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:366- [Conf]
  52. Toshihiko Matsuo
    Restricted message signing. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:367- [Conf]
  53. Walid Bagga, Refik Molva, Stefano Crosta
    Policy-based encryption schemes from bilinear pairings. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:368- [Conf]
  54. Michael Neve, Jean-Pierre Seifert, Zhenghong Wang
    A refined look at Bernstein's AES side-channel analysis. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:369- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002