The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2006 (conf/ccs/2006usa)

  1. Peter G. Neumann
    System and network trustworthiness in perspective. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:1-5 [Conf]
  2. Bo Zhu, Sanjeev Setia, Sushil Jajodia
    Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf]
  3. Arjun Nambiar, Matthew Wright
    Salsa: a structured approach to large-scale anonymity. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:17-26 [Conf]
  4. Steven J. Murdoch
    Hot or not: revealing hidden services by their clock skew. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:27-36 [Conf]
  5. XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
    Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
  6. Shai Rubin, Somesh Jha, Barton P. Miller
    Protomatching network traffic for high throughputnetwork intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:47-58 [Conf]
  7. Prahlad Fogla, Wenke Lee
    Evading network anomaly detection systems: formal reasoning and practical techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:59-68 [Conf]
  8. Philippe Golle, Frank McSherry, Ilya Mironov
    Data collection with self-enforcing privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:69-78 [Conf]
  9. Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky
    Searchable symmetric encryption: improved definitions and efficient constructions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:79-88 [Conf]
  10. Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
    Attribute-based encryption for fine-grained access control of encrypted data. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:89-98 [Conf]
  11. Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters
    Secure attribute-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:99-112 [Conf]
  12. Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
    Resiliency policies in access control. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:113-123 [Conf]
  13. Adam J. Lee, Marianne Winslett
    Safety and consistency in policy-based authorization systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:124-133 [Conf]
  14. Keith Irwin, Ting Yu, William H. Winsborough
    On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf]
  15. Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner
    RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf]
  16. Umesh Shankar, Chris Karlof
    Doppelganger: Better browser privacy without the bother. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:154-167 [Conf]
  17. John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
    Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf]
  18. Mengjun Xie, Heng Yin, Haining Wang
    An effective defense against email spam laundering. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:179-190 [Conf]
  19. Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
    Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf]
  20. Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
    How to win the clonewars: efficient periodic n-times anonymous authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:201-210 [Conf]
  21. Dan Boneh, Brent Waters
    A fully collusion resistant broadcast, trace, and revoke system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf]
  22. V. T. Lam, Spyros Antonatos, P. Akritidis, Kostas G. Anagnostakis
    Puppetnets: misusing web browsers as a distributed attack infrastructure. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:221-234 [Conf]
  23. Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield
    A natural language approach to automated cryptanalysis of two-time pads. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:235-244 [Conf]
  24. Yigael Berger, Avishai Wool, Arie Yeredor
    Dictionary attacks using keyboard acoustic emanations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:245-254 [Conf]
  25. Marc Liberatore, Brian Neil Levine
    Inferring the source of encrypted HTTP connections. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:255-263 [Conf]
  26. Kun Sun, Peng Ning, Cliff Wang
    TinySeRSync: secure and resilient time synchronization in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:264-277 [Conf]
  27. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf]
  28. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf]
  29. Kevin R. B. Butler, Patrick McDaniel, William Aiello
    Optimizing BGP security by exploiting path stability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:298-310 [Conf]
  30. James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song
    Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf]
  31. Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler
    EXE: automatically generating inputs of death. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:322-335 [Conf]
  32. Xinming Ou, Wayne F. Boyer, Miles A. McQueen
    A scalable approach to attack graph generation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:336-345 [Conf]
  33. Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean
    Formal specification and verification of data separation in a separation kernel for an embedded system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:346-355 [Conf]
  34. Ninghui Li, Qihua Wang
    Beyond separation of duty: an algebra for specifying high-level security policies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:356-369 [Conf]
  35. Michael Backes, Peeter Laud
    Computationally sound secrecy proofs by mechanized flow analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:370-379 [Conf]
  36. Mihir Bellare, Tadayoshi Kohno, Victor Shoup
    Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:380-389 [Conf]
  37. Mihir Bellare, Gregory Neven
    Multi-signatures in the plain public-Key model and a general forking lemma. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:390-399 [Conf]
  38. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
    Deniable authentication and key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:400-409 [Conf]
  39. Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
    Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002