Conferences in DBLP
Chae Hoon Lim , Taekyoung Kwon Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:1-20 [Conf ] Chiu C. Tan , Qun Li A Robust and Secure RFID-Based Pedigree System (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:21-29 [Conf ] Benoît Garbinato , Ian Rickebusch A Topological Condition for Solving Fair Exchange in Byzantine Environments. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:30-49 [Conf ] Jeanette Tsang , Konstantin Beznosov A Security Analysis of the Precise Time Protocol (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:50-59 [Conf ] Kyung-Ah Shim An Identity-Based Proxy Signature Scheme from Pairings. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:60-71 [Conf ] Huafei Zhu , Jianying Zhou Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:72-81 [Conf ] Guomin Yang , Duncan S. Wong , Huaxiong Wang , Xiaotie Deng Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:82-91 [Conf ] Tatsuyuki Matsushita , Hideki Imai Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:92-111 [Conf ] Onur Aciiçmez , Çetin Kaya Koç Trace-Driven Cache Attacks on AES (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:112-121 [Conf ] Jiangtao Li , Ninghui Li A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:122-138 [Conf ] Evan Martin , Tao Xie , Ting Yu Defining and Measuring Policy Coverage in Testing Access Control Policies. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:139-158 [Conf ] Ziqing Mao , Ninghui Li , William H. Winsborough Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:159-173 [Conf ] Jörg Platte , Raúl Durán Díaz , Edwin Naroska An Operating System Design for the Security Architecture for Microprocessors. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:174-189 [Conf ] Danfeng Yao , Keith B. Frikken , Mikhail J. Atallah , Roberto Tamassia Point-Based Trust: Define How Much Privacy Is Worth. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:190-209 [Conf ] Yingpeng Sang , Hong Shen , Yasuo Tan , Naixue Xiong Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:210-227 [Conf ] Karsten Nohl , David Evans Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:228-237 [Conf ] He Ge An Anonymous Authentication Scheme for Identification Card. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:238-248 [Conf ] Geir Olav Dyrkolbotn , Einar Snekkenes A Wireless Covert Channel on Smart Cards (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:249-259 [Conf ] Himanshu Khurana , Jin Heo , Meenal Pant From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:260-281 [Conf ] Gabriel Maciá-Fernández , Jesús E. Díaz-Verdejo , Pedro Garcia-Teodoro Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:282-291 [Conf ] Errin W. Fulp An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:292-301 [Conf ] Oleksiy Mazhelis , Seppo Puuronen , Mika Raento Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:302-321 [Conf ] Lingli Deng , Yeping He , Ziyao Xu , Chunyang Yuan An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:322-331 [Conf ] V. N. Venkatakrishnan , Wei Xu , Daniel C. DuVarney , R. Sekar Provably Correct Runtime Enforcement of Non-interference Properties. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:332-351 [Conf ] Yongdong Wu , Zhigang Zhao , Tian Wei Chui An Attack on SMC-Based Software Protection. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:352-368 [Conf ] Carla Marceau , Matthew Stillerman Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:369-378 [Conf ] Yves Younan , Wouter Joosen , Frank Piessens Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:379-398 [Conf ] Guilin Wang , Feng Bao Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:399-409 [Conf ] Kyung-Ah Shim , Seung-Hyun Seo Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:410-419 [Conf ] James A. Muir Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:420-434 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou The Fairness of Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:435-451 [Conf ] Michael de Mare , Rebecca N. Wright Secure Set Membership Using 3Sat. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:452-468 [Conf ] Billy Bob Brumley Left-to-Right Signed-Bit tau -Adic Representations of n Integers (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:469-478 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Wei Wu Universal Designated Verifier Signature Without Delegatability. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:479-498 [Conf ] Richard J. Edell , Peter Kruus , Uri Meth Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:499-506 [Conf ] Kazuyoshi Furukawa , Masahiko Takenaka , Kouichi Itoh A Fast RSA Implementation on Itanium 2 Processor. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:507-518 [Conf ] Haodong Wang , Qun Li Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:519-528 [Conf ] Svetla Nikova , Christian Rechberger , Vincent Rijmen Threshold Implementations Against Side-Channel Attacks and Glitches. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:529-545 [Conf ] Xiaozhuo Gu , Yufeng Li , Jianzu Yang , Julong Lan Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:546-555 [Conf ]