|
Conferences in DBLP
- Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:1-16 [Conf]
- Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:17-31 [Conf]
- Matthew Burnside, Angelos D. Keromytis
Low Latency Anonymity with Mix Rings. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:32-45 [Conf]
- George Danezis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:46-59 [Conf]
- Maurizio Atzori
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:60-71 [Conf]
- Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest
Protecting Data Privacy Through Hard-to-Reverse Negative Databases. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:72-84 [Conf]
- Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
Related-Key Rectangle Attack on 42-Round SHACAL-2. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:85-100 [Conf]
- Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:101-116 [Conf]
- Javier Herranz, Fabien Laguillaumie
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:117-130 [Conf]
- Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
Multi-party Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:131-145 [Conf]
- Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
Formal Security Model of Multisignatures. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:146-160 [Conf]
- Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai
Cryptanalysis of Variants of UOV. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:161-170 [Conf]
- Christophe De Cannière
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:171-186 [Conf]
- Yaniv Shaked, Avishai Wool
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:187-202 [Conf]
- Ellen Jochemsz, Benne de Weger
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:203-216 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:217-232 [Conf]
- Walid Bagga, Refik Molva
Collusion-Free Policy-Based Encryption. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:233-245 [Conf]
- István Zsolt Berta
Using Multiple Smart Cards for Signing Messages at Malicious Terminals. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:246-256 [Conf]
- Michal Ren, Tanmoy Kanti Das, Jianying Zhou
Diverging Keys in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:257-269 [Conf]
- Ulrich Huber, Ahmad-Reza Sadeghi
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:270-285 [Conf]
- Thomas Stütz, Andreas Uhl
Transparent Image Encryption Using Progressive JPEG. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:286-298 [Conf]
- Vassilis Prevelakis, Sotiris Ioannidis
Preserving TCP Connections Across Host Address Changes. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:299-310 [Conf]
- André Zúquete, Hugo Marques
A Security Architecture for Protecting LAN Interactions. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:311-326 [Conf]
- Igor V. Kotenko, Alexander Ulanov
Simulation of Internet DDoS Attacks and Defense. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:327-342 [Conf]
- Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:343-358 [Conf]
- Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:359-372 [Conf]
- Huifang Yin, Jun Li
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:373-382 [Conf]
- Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:383-397 [Conf]
- Luciano Bononi, Carlo Tacconi
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:398-414 [Conf]
- Sang-Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won-Suk Lee
Anomaly Intrusion Detection Based on Clustering a Data Stream. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:415-426 [Conf]
- Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:427-442 [Conf]
- SeongHan Shin, Kazukuni Kobara, Hideki Imai
An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:443-458 [Conf]
- Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:459-475 [Conf]
- Hugo L. Jonker, Erik P. de Vink
Formalising Receipt-Freeness. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:476-488 [Conf]
- Mohammed Assora, Ayoub Shirvani
Enhancing the Security and Efficiency of 3-D Secure. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:489-501 [Conf]
- David von Oheimb, Jorge Cuéllar
Designing and Verifying Core Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:502-516 [Conf]
- Mila Katzarova, Andrew Simpson
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:517-529 [Conf]
- José Manuel Torres, Jose Maria Sarriegi, Javier Santos, Nicolás Serrano
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:530-545 [Conf]
|