The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2006 (conf/icics/2006)

  1. Chae Hoon Lim, Taekyoung Kwon
    Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:1-20 [Conf]
  2. Chiu C. Tan, Qun Li
    A Robust and Secure RFID-Based Pedigree System (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:21-29 [Conf]
  3. Benoît Garbinato, Ian Rickebusch
    A Topological Condition for Solving Fair Exchange in Byzantine Environments. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:30-49 [Conf]
  4. Jeanette Tsang, Konstantin Beznosov
    A Security Analysis of the Precise Time Protocol (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:50-59 [Conf]
  5. Kyung-Ah Shim
    An Identity-Based Proxy Signature Scheme from Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:60-71 [Conf]
  6. Huafei Zhu, Jianying Zhou
    Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:72-81 [Conf]
  7. Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
    Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:82-91 [Conf]
  8. Tatsuyuki Matsushita, Hideki Imai
    Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:92-111 [Conf]
  9. Onur Aciiçmez, Çetin Kaya Koç
    Trace-Driven Cache Attacks on AES (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:112-121 [Conf]
  10. Jiangtao Li, Ninghui Li
    A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:122-138 [Conf]
  11. Evan Martin, Tao Xie, Ting Yu
    Defining and Measuring Policy Coverage in Testing Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:139-158 [Conf]
  12. Ziqing Mao, Ninghui Li, William H. Winsborough
    Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:159-173 [Conf]
  13. Jörg Platte, Raúl Durán Díaz, Edwin Naroska
    An Operating System Design for the Security Architecture for Microprocessors. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:174-189 [Conf]
  14. Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
    Point-Based Trust: Define How Much Privacy Is Worth. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:190-209 [Conf]
  15. Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong
    Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:210-227 [Conf]
  16. Karsten Nohl, David Evans
    Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:228-237 [Conf]
  17. He Ge
    An Anonymous Authentication Scheme for Identification Card. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:238-248 [Conf]
  18. Geir Olav Dyrkolbotn, Einar Snekkenes
    A Wireless Covert Channel on Smart Cards (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:249-259 [Conf]
  19. Himanshu Khurana, Jin Heo, Meenal Pant
    From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:260-281 [Conf]
  20. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:282-291 [Conf]
  21. Errin W. Fulp
    An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:292-301 [Conf]
  22. Oleksiy Mazhelis, Seppo Puuronen, Mika Raento
    Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:302-321 [Conf]
  23. Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan
    An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:322-331 [Conf]
  24. V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar
    Provably Correct Runtime Enforcement of Non-interference Properties. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:332-351 [Conf]
  25. Yongdong Wu, Zhigang Zhao, Tian Wei Chui
    An Attack on SMC-Based Software Protection. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:352-368 [Conf]
  26. Carla Marceau, Matthew Stillerman
    Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:369-378 [Conf]
  27. Yves Younan, Wouter Joosen, Frank Piessens
    Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:379-398 [Conf]
  28. Guilin Wang, Feng Bao
    Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:399-409 [Conf]
  29. Kyung-Ah Shim, Seung-Hyun Seo
    Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:410-419 [Conf]
  30. James A. Muir
    Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:420-434 [Conf]
  31. Guilin Wang, Feng Bao, Jianying Zhou
    The Fairness of Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:435-451 [Conf]
  32. Michael de Mare, Rebecca N. Wright
    Secure Set Membership Using 3Sat. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:452-468 [Conf]
  33. Billy Bob Brumley
    Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:469-478 [Conf]
  34. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu
    Universal Designated Verifier Signature Without Delegatability. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:479-498 [Conf]
  35. Richard J. Edell, Peter Kruus, Uri Meth
    Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:499-506 [Conf]
  36. Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
    A Fast RSA Implementation on Itanium 2 Processor. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:507-518 [Conf]
  37. Haodong Wang, Qun Li
    Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:519-528 [Conf]
  38. Svetla Nikova, Christian Rechberger, Vincent Rijmen
    Threshold Implementations Against Side-Channel Attacks and Glitches. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:529-545 [Conf]
  39. Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan
    Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:546-555 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002