default search action
8. ICICS 2006: Raleigh, NC, USA
- Peng Ning, Sihan Qing, Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0
Security Protocols
- Chae Hoon Lim, Taekyoung Kwon:
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. 1-20 - Chiu C. Tan, Qun Li:
A Robust and Secure RFID-Based Pedigree System (Short Paper). 21-29 - Benoît Garbinato, Ian Rickebusch:
A Topological Condition for Solving Fair Exchange in Byzantine Environments. 30-49 - Jeanette Tsang, Konstantin Beznosov:
A Security Analysis of the Precise Time Protocol (Short Paper). 50-59
Applied Crytography
- Kyung-Ah Shim:
An Identity-Based Proxy Signature Scheme from Pairings. 60-71 - Huafei Zhu, Jianying Zhou:
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). 72-81 - Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). 82-91 - Tatsuyuki Matsushita, Hideki Imai:
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. 92-111 - Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES (Short Paper). 112-121
Access Control and Systems Security
- Jiangtao Li, Ninghui Li:
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. 122-138 - Evan Martin, Tao Xie, Ting Yu:
Defining and Measuring Policy Coverage in Testing Access Control Policies. 139-158 - Ziqing Mao, Ninghui Li, William H. Winsborough:
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). 159-173 - Jörg Platte, Raúl Durán Díaz, Edwin Naroska:
An Operating System Design for the Security Architecture for Microprocessors. 174-189
Privacy and Malicious Code
- Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. 190-209 - Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong:
Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. 210-227 - Karsten Nohl, David Evans:
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). 228-237 - He Ge:
An Anonymous Authentication Scheme for Identification Card. 238-248 - Geir Olav Dyrkolbotn, Einar Snekkenes:
A Wireless Covert Channel on Smart Cards (Short Paper). 249-259
Network Security
- Himanshu Khurana, Jin Heo, Meenal Pant:
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. 260-281 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). 282-291 - Errin W. Fulp:
An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). 292-301 - Oleksiy Mazhelis, Seppo Puuronen, Mika Raento:
Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario. 302-321 - Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan:
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). 322-331
Systems Security
- V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar:
Provably Correct Runtime Enforcement of Non-interference Properties. 332-351 - Yongdong Wu, Zhigang Zhao, Tian Wei Chui:
An Attack on SMC-Based Software Protection. 352-368 - Carla Marceau, Matthew Stillerman:
Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). 369-378 - Yves Younan, Wouter Joosen, Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. 379-398
Cryptanalysis
- Guilin Wang, Feng Bao:
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. 399-409 - Kyung-Ah Shim, Seung-Hyun Seo:
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). 410-419 - James A. Muir:
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. 420-434 - Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. 435-451
Applied Cryptography and Network Security
- Michael de Mare, Rebecca N. Wright:
Secure Set Membership Using 3Sat. 452-468 - Billy Bob Brumley:
Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). 469-478 - Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Universal Designated Verifier Signature Without Delegatability. 479-498 - Richard J. Edell, Peter Kruus, Uri Meth:
Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). 499-506
Security Implementations
- Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh:
A Fast RSA Implementation on Itanium 2 Processor. 507-518 - Haodong Wang, Qun Li:
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). 519-528 - Svetla Nikova, Christian Rechberger, Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches. 529-545 - Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan:
Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). 546-555
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.