Conferences in DBLP
Peter G. Neumann System and network trustworthiness in perspective. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:1-5 [Conf ] Bo Zhu , Sanjeev Setia , Sushil Jajodia Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf ] Arjun Nambiar , Matthew Wright Salsa: a structured approach to large-scale anonymity. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:17-26 [Conf ] Steven J. Murdoch Hot or not: revealing hidden services by their clock skew. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:27-36 [Conf ] XiaoFeng Wang , Zhuowei Li , Jun Xu , Michael K. Reiter , Chongkyung Kil , Jong Youl Choi Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf ] Shai Rubin , Somesh Jha , Barton P. Miller Protomatching network traffic for high throughputnetwork intrusion detection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:47-58 [Conf ] Prahlad Fogla , Wenke Lee Evading network anomaly detection systems: formal reasoning and practical techniques. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:59-68 [Conf ] Philippe Golle , Frank McSherry , Ilya Mironov Data collection with self-enforcing privacy. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:69-78 [Conf ] Reza Curtmola , Juan A. Garay , Seny Kamara , Rafail Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:79-88 [Conf ] Vipul Goyal , Omkant Pandey , Amit Sahai , Brent Waters Attribute-based encryption for fine-grained access control of encrypted data. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:89-98 [Conf ] Matthew Pirretti , Patrick Traynor , Patrick McDaniel , Brent Waters Secure attribute-based systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:99-112 [Conf ] Ninghui Li , Mahesh V. Tripunitara , Qihua Wang Resiliency policies in access control. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:113-123 [Conf ] Adam J. Lee , Marianne Winslett Safety and consistency in policy-based authorization systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:124-133 [Conf ] Keith Irwin , Ting Yu , William H. Winsborough On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf ] Jaideep Vaidya , Vijayalakshmi Atluri , Janice Warner RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf ] Umesh Shankar , Chris Karlof Doppelganger: Better browser privacy without the bother. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:154-167 [Conf ] John G. Brainard , Ari Juels , Ronald L. Rivest , Michael Szydlo , Moti Yung Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf ] Mengjun Xie , Heng Yin , Haining Wang An effective defense against email spam laundering. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:179-190 [Conf ] Xavier Boyen , Hovav Shacham , Emily Shen , Brent Waters Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf ] Jan Camenisch , Susan Hohenberger , Markulf Kohlweiss , Anna Lysyanskaya , Mira Meyerovich How to win the clonewars: efficient periodic n-times anonymous authentication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:201-210 [Conf ] Dan Boneh , Brent Waters A fully collusion resistant broadcast, trace, and revoke system. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf ] V. T. Lam , Spyros Antonatos , P. Akritidis , Kostas G. Anagnostakis Puppetnets: misusing web browsers as a distributed attack infrastructure. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:221-234 [Conf ] Joshua Mason , Kathryn Watkins , Jason Eisner , Adam Stubblefield A natural language approach to automated cryptanalysis of two-time pads. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:235-244 [Conf ] Yigael Berger , Avishai Wool , Arie Yeredor Dictionary attacks using keyboard acoustic emanations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:245-254 [Conf ] Marc Liberatore , Brian Neil Levine Inferring the source of encrypted HTTP connections. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:255-263 [Conf ] Kun Sun , Peng Ning , Cliff Wang TinySeRSync: secure and resilient time synchronization in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:264-277 [Conf ] Haowen Chan , Adrian Perrig , Dawn Xiaodong Song Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf ] Giuseppe Ateniese , Alfredo De Santis , Anna Lisa Ferrara , Barbara Masucci Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf ] Kevin R. B. Butler , Patrick McDaniel , William Aiello Optimizing BGP security by exploiting path stability. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:298-310 [Conf ] James Newsome , David Brumley , Jason Franklin , Dawn Xiaodong Song Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf ] Cristian Cadar , Vijay Ganesh , Peter M. Pawlowski , David L. Dill , Dawson R. Engler EXE: automatically generating inputs of death. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:322-335 [Conf ] Xinming Ou , Wayne F. Boyer , Miles A. McQueen A scalable approach to attack graph generation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:336-345 [Conf ] Constance L. Heitmeyer , Myla Archer , Elizabeth I. Leonard , John D. McLean Formal specification and verification of data separation in a separation kernel for an embedded system. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:346-355 [Conf ] Ninghui Li , Qihua Wang Beyond separation of duty: an algebra for specifying high-level security policies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:356-369 [Conf ] Michael Backes , Peeter Laud Computationally sound secrecy proofs by mechanized flow analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:370-379 [Conf ] Mihir Bellare , Tadayoshi Kohno , Victor Shoup Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:380-389 [Conf ] Mihir Bellare , Gregory Neven Multi-signatures in the plain public-Key model and a general forking lemma. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:390-399 [Conf ] Mario Di Raimondo , Rosario Gennaro , Hugo Krawczyk Deniable authentication and key exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:400-409 [Conf ] Louis Kruger , Somesh Jha , Eu-Jin Goh , Dan Boneh Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf ]