


default search action
1st AsiaCCS 2006: Taipei, Taiwan
- Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia:

Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM 2006, ISBN 1-59593-272-0
Invited Talks
- Virgil D. Gligor:

Emergent properties in ad-hoc networks: a security perspective. 1 - Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang:

Secure information sharing enabled by Trusted Computing and PEI models. 2-12 - Shankar Sastry:

TRUST: in cyberspace and beyond. 13 - Jeannette M. Wing:

Attack graph generation and analysis. 14 - Ravishankar K. Iyer:

Security vulnerabilities: from measurements to design. 15 - Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph

, J. D. Tygar:
Can machine learning be secure? 16-25
Security protocols
- Claude Castelluccia, Einar Mykletun, Gene Tsudik:

Improving secure server performance by re-balancing SSL/TLS handshakes. 26-34 - Michel Abdalla

, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
:
Provably secure password-based authentication in TLS. 35-45 - Himanshu Khurana, Hyung-Seok Hahm:

Certified mailing lists. 46-58 - Ching Yu Ng, Willy Susilo

, Yi Mu:
Designated group credentials. 59-65
Database security
- Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri

:
Privacy-preserving semantic interoperation and access control of heterogeneous databases. 66-77 - Yingjiu Li, Robert Huijie Deng

:
Publicly verifiable ownership protection for relational databases. 78-89
Intrusion detection and modeling
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:

Measuring intrusion detection capability: an information-theoretic approach. 90-101 - Jouni Viinikka, Hervé Debar

, Ludovic Mé, Renaud Séguier
:
Time series modeling for IDS alert management. 102-113 - Ashish Gehani, Surendar Chandra, Gershon Kedem:

Augmenting storage with an intrusion response primitive to ensure the security of critical data. 114-124 - David Brumley

, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song:
Design space and analysis of worm defense strategies. 125-137
P2P & ad hoc networks
- Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek

, Willy Susilo
:
Self-organised group key management for ad hoc networks. 138-147 - Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin:

Lightweight, pollution-attack resistant multicast authentication scheme. 148-156
Digital rights management and watermarking
- Gaurav Gupta

, Josef Pieprzyk
, Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents. 157-165 - Soo-Chang Pei, Yi-Chong Zeng:

Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. 166-174 - Xinshan Zhu, Yong Gao, Yan Zhu

:
Image-adaptive watermarking based on perceptually shaping watermark blockwise. 175-181 - Ee-Chien Chang

, Ren Shen, Francis Weijian Teo:
Finding the original point set hidden among chaff. 182-188
Software security
- Juan A. Garay, Lorenz Huelsbergen:

Software integrity protection using timed executable agents. 189-200 - Manigandan Radhakrishnan, Jon A. Solworth:

Application security support in the operating system kernel. 201-211
Access control and authorization
- Claudio A. Ardagna

, Marco Cremonini
, Ernesto Damiani
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
Supporting location-based conditions in access control policies. 212-222 - Wen-Guey Tzeng:

A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. 223-230 - Jon A. Solworth:

Approvability. 231-242 - Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce:

Safety analysis of usage control authorization models. 243-254
Authentication and biometrics
- Yanjiang Yang, Robert H. Deng

, Feng Bao:
Fortifying password authentication in integrated healthcare delivery systems. 255-265 - Yan Zhu

, Wei Zou, Xinshan Zhu:
Collusion secure convolutional fingerprinting information codes. 266-274
Cryptosystem and analysis
- S. Anand, Gurumurthi V. Ramanan:

Periodicity, complementarity and complexity of 2-adic FCSR combiner generators. 275-282 - Alexander Maximov:

Cryptanalysis of the "Grain" family of stream ciphers. 283-288 - Roberto Di Pietro

, Luigi V. Mancini
, Antonio Durante, Vishwas Patil:
Addressing the shortcomings of one-way chains. 289-296 - Sherman S. M. Chow

, Victor K.-W. Wei, Joseph K. Liu
, Tsz Hon Yuen
:
Ring signatures without random oracles. 297-302
Wireless sensor networks
- Erik-Oliver Blaß, Martina Zitterbart:

An efficient key establishment scheme for secure aggregating sensor networks. 303-310 - Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh:

An efficient broadcast authentication scheme in wireless sensor networks. 311-320
Secure routing and firewall
- E-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park:

Identity-based registry for secure interdomain routing. 321-331 - Hazem H. Hamed, Ehab Al-Shaer:

Dynamic rule-ordering optimization for high-speed firewall filtering. 332-342 - Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:

Digitally signed document sanitizing scheme based on bilinear maps. 343-354
Fast abstract session: multimedia security
- Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu

:
Digital invisible ink: revealing true secrets via attacking. 355 - Shan Ming Tsu, W. S. Hsieh:

Quadtree based perceptual watermarking scheme. 356 - Jun Li

, Wei-Yun Yau, Han Wang
:
Continuous fingerprints classification by symmetrical filters. 357
Fast abstract session: network security
- Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu:

A general design towards secure ad-hoc collaboration. 358 - Chun-Ying Huang

, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography. 359 - Jiun-Tze Lai, Ting-Wei Hou:

An efficient secure communication between set-top box and smart card in DTV broadcasting. 360 - Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh:

Forgery attack on the RPC incremental unforgeable encryption scheme. 361 - Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao:

A control flow obfuscation method to discourage malicious tampering of software codes. 362 - Masahiro Mambo, Moisés Salinas-Rosales

, Kazuo Ohta, Noboru Kunihiro:
Problems on the MR micropayment schemes. 363 - Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann:

Design and implementation of a reconfigurable hardware for secure embedded systems. 364
Fast abstract session: digital signature
- Mark Manulis

:
Democratic group signatures: on an example of joint ventures. 365 - Lin-Chuan Wu:

Analysis of traceability attack on Camenisch et al.'s blind signature schemes. 366 - Toshihiko Matsuo:

Restricted message signing. 367
Fast abstract session: cryptosystem
- Walid Bagga, Refik Molva

, Stefano Crosta:
Policy-based encryption schemes from bilinear pairings. 368 - Michael Neve, Jean-Pierre Seifert, Zhenghong Wang:

A refined look at Bernstein's AES side-channel analysis. 369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














