The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2006 (conf/isw/2006)

  1. Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
    Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:1-16 [Conf]
  2. Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie
    Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:17-31 [Conf]
  3. Matthew Burnside, Angelos D. Keromytis
    Low Latency Anonymity with Mix Rings. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:32-45 [Conf]
  4. George Danezis
    Breaking Four Mix-Related Schemes Based on Universal Re-encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:46-59 [Conf]
  5. Maurizio Atzori
    Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:60-71 [Conf]
  6. Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest
    Protecting Data Privacy Through Hard-to-Reverse Negative Databases. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:72-84 [Conf]
  7. Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
    Related-Key Rectangle Attack on 42-Round SHACAL-2. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:85-100 [Conf]
  8. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:101-116 [Conf]
  9. Javier Herranz, Fabien Laguillaumie
    Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:117-130 [Conf]
  10. Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
    Multi-party Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:131-145 [Conf]
  11. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    Formal Security Model of Multisignatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:146-160 [Conf]
  12. Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai
    Cryptanalysis of Variants of UOV. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:161-170 [Conf]
  13. Christophe De Cannière
    Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:171-186 [Conf]
  14. Yaniv Shaked, Avishai Wool
    Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:187-202 [Conf]
  15. Ellen Jochemsz, Benne de Weger
    A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:203-216 [Conf]
  16. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:217-232 [Conf]
  17. Walid Bagga, Refik Molva
    Collusion-Free Policy-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:233-245 [Conf]
  18. István Zsolt Berta
    Using Multiple Smart Cards for Signing Messages at Malicious Terminals. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:246-256 [Conf]
  19. Michal Ren, Tanmoy Kanti Das, Jianying Zhou
    Diverging Keys in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:257-269 [Conf]
  20. Ulrich Huber, Ahmad-Reza Sadeghi
    A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:270-285 [Conf]
  21. Thomas Stütz, Andreas Uhl
    Transparent Image Encryption Using Progressive JPEG. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:286-298 [Conf]
  22. Vassilis Prevelakis, Sotiris Ioannidis
    Preserving TCP Connections Across Host Address Changes. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:299-310 [Conf]
  23. André Zúquete, Hugo Marques
    A Security Architecture for Protecting LAN Interactions. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:311-326 [Conf]
  24. Igor V. Kotenko, Alexander Ulanov
    Simulation of Internet DDoS Attacks and Defense. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:327-342 [Conf]
  25. Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
    SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:343-358 [Conf]
  26. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
    Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:359-372 [Conf]
  27. Huifang Yin, Jun Li
    An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:373-382 [Conf]
  28. Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang
    Resistance Analysis to Intruders' Evasion of Detecting Intrusion. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:383-397 [Conf]
  29. Luciano Bononi, Carlo Tacconi
    A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:398-414 [Conf]
  30. Sang-Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won-Suk Lee
    Anomaly Intrusion Detection Based on Clustering a Data Stream. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:415-426 [Conf]
  31. Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
    Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:427-442 [Conf]
  32. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:443-458 [Conf]
  33. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
    A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:459-475 [Conf]
  34. Hugo L. Jonker, Erik P. de Vink
    Formalising Receipt-Freeness. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:476-488 [Conf]
  35. Mohammed Assora, Ayoub Shirvani
    Enhancing the Security and Efficiency of 3-D Secure. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:489-501 [Conf]
  36. David von Oheimb, Jorge Cuéllar
    Designing and Verifying Core Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:502-516 [Conf]
  37. Mila Katzarova, Andrew Simpson
    Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:517-529 [Conf]
  38. José Manuel Torres, Jose Maria Sarriegi, Javier Santos, Nicolás Serrano
    Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:530-545 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002