


default search action
8. ICICS 2006: Raleigh, NC, USA
- Peng Ning, Sihan Qing, Ninghui Li:

Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0
Security Protocols
- Chae Hoon Lim, Taekyoung Kwon:

Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. 1-20 - Chiu C. Tan, Qun Li

:
A Robust and Secure RFID-Based Pedigree System (Short Paper). 21-29 - Benoît Garbinato

, Ian Rickebusch:
A Topological Condition for Solving Fair Exchange in Byzantine Environments. 30-49 - Jeanette Tsang, Konstantin Beznosov:

A Security Analysis of the Precise Time Protocol (Short Paper). 50-59
Applied Crytography
- Kyung-Ah Shim:

An Identity-Based Proxy Signature Scheme from Pairings. 60-71 - Huafei Zhu, Jianying Zhou:

Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). 72-81 - Guomin Yang

, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). 82-91 - Tatsuyuki Matsushita, Hideki Imai:

Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. 92-111 - Onur Aciiçmez, Çetin Kaya Koç

:
Trace-Driven Cache Attacks on AES (Short Paper). 112-121
Access Control and Systems Security
- Jiangtao Li, Ninghui Li:

A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. 122-138 - Evan Martin, Tao Xie, Ting Yu:

Defining and Measuring Policy Coverage in Testing Access Control Policies. 139-158 - Ziqing Mao, Ninghui Li, William H. Winsborough:

Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). 159-173 - Jörg Platte, Raúl Durán Díaz, Edwin Naroska:

An Operating System Design for the Security Architecture for Microprocessors. 174-189
Privacy and Malicious Code
- Danfeng Yao

, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. 190-209 - Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong:

Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. 210-227 - Karsten Nohl, David Evans

:
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). 228-237 - He Ge:

An Anonymous Authentication Scheme for Identification Card. 238-248 - Geir Olav Dyrkolbotn, Einar Snekkenes:

A Wireless Covert Channel on Smart Cards (Short Paper). 249-259
Network Security
- Himanshu Khurana, Jin Heo, Meenal Pant:

From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. 260-281 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro

:
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). 282-291 - Errin W. Fulp:

An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). 292-301 - Oleksiy Mazhelis, Seppo Puuronen, Mika Raento:

Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario. 302-321 - Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan:

An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). 322-331
Systems Security
- V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar:

Provably Correct Runtime Enforcement of Non-interference Properties. 332-351 - Yongdong Wu, Zhigang Zhao, Tian Wei Chui:

An Attack on SMC-Based Software Protection. 352-368 - Carla Marceau, Matthew Stillerman:

Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). 369-378 - Yves Younan, Wouter Joosen, Frank Piessens:

Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. 379-398
Cryptanalysis
- Guilin Wang, Feng Bao:

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. 399-409 - Kyung-Ah Shim, Seung-Hyun Seo

:
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). 410-419 - James A. Muir:

Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. 420-434 - Guilin Wang, Feng Bao, Jianying Zhou:

The Fairness of Perfect Concurrent Signatures. 435-451
Applied Cryptography and Network Security
- Michael de Mare, Rebecca N. Wright:

Secure Set Membership Using 3Sat. 452-468 - Billy Bob Brumley

:
Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). 469-478 - Xinyi Huang, Willy Susilo

, Yi Mu, Wei Wu:
Universal Designated Verifier Signature Without Delegatability. 479-498 - Richard J. Edell, Peter Kruus, Uri Meth:

Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). 499-506
Security Implementations
- Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh:

A Fast RSA Implementation on Itanium 2 Processor. 507-518 - Haodong Wang, Qun Li

:
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). 519-528 - Svetla Nikova, Christian Rechberger, Vincent Rijmen:

Threshold Implementations Against Side-Channel Attacks and Glitches. 529-545 - Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan:

Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). 546-555

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














