


default search action
9. ISC 2006: Samos Island, Greece
- Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel:

Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7
Software Security
- Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna:

Extending .NET Security to Unmanaged Code. 1-16 - Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:

Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. 17-31
Privacy and Anonymity
- Matthew Burnside, Angelos D. Keromytis:

Low Latency Anonymity with Mix Rings. 32-45 - George Danezis:

Breaking Four Mix-Related Schemes Based on Universal Re-encryption. 46-59 - Maurizio Atzori:

Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. 60-71 - Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest:

Protecting Data Privacy Through Hard-to-Reverse Negative Databases. 72-84
Block Ciphers and Hash Functions
- Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:

Related-Key Rectangle Attack on 42-Round SHACAL-2. 85-100 - Florian Mendel

, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
On the Collision Resistance of RIPEMD-160. 101-116
Digital Signatures
- Javier Herranz, Fabien Laguillaumie:

Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. 117-130 - Dongvu Tonien, Willy Susilo

, Reihaneh Safavi-Naini:
Multi-party Concurrent Signatures. 131-145 - Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura

:
Formal Security Model of Multisignatures. 146-160 - Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai:

Cryptanalysis of Variants of UOV. 161-170
Stream Ciphers
- Christophe De Cannière:

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. 171-186 - Yaniv Shaked, Avishai Wool

:
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. 187-202
Encryption I
- Ellen Jochemsz, Benne de Weger:

A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. 203-216 - Joonsang Baek

, Reihaneh Safavi-Naini, Willy Susilo
:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. 217-232 - Walid Bagga, Refik Molva:

Collusion-Free Policy-Based Encryption. 233-245
Pervasive Computing
- István Zsolt Berta:

Using Multiple Smart Cards for Signing Messages at Malicious Terminals. 246-256 - Michal Ren, Tanmoy Kanti Das, Jianying Zhou:

Diverging Keys in Wireless Sensor Networks. 257-269
Encryption II
- Ulrich Huber, Ahmad-Reza Sadeghi:

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. 270-285 - Thomas Stütz, Andreas Uhl:

Transparent Image Encryption Using Progressive JPEG. 286-298
Network Security
- Vassilis Prevelakis, Sotiris Ioannidis:

Preserving TCP Connections Across Host Address Changes. 299-310 - André Zúquete

, Hugo Marques:
A Security Architecture for Protecting LAN Interactions. 311-326 - Igor V. Kotenko

, Alexander Ulanov:
Simulation of Internet DDoS Attacks and Defense. 327-342 - Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna:

SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. 343-358
Watermarking and DRM
- Jie Guo, Yingjiu Li, Robert H. Deng

, Kefei Chen:
Rights Protection for Data Cubes. 359-372 - Huifang Yin, Jun Li:

An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). 373-382
Intrusion Detection and Worms
- Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang:

Resistance Analysis to Intruders' Evasion of Detecting Intrusion. 383-397 - Luciano Bononi

, Carlo Tacconi:
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. 398-414 - Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee:

Anomaly Intrusion Detection Based on Clustering a Data Stream. 415-426 - Kostas G. Anagnostakis

, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald:
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. 427-442
Key Exchange
- SeongHan Shin, Kazukuni Kobara, Hideki Imai:

An Authentication and Key Exchange Protocol for Secure Credential Services. 443-458 - Yvo Desmedt, Josef Pieprzyk

, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. 459-475
Security Protocols and Formal Methods
- Hugo L. Jonker, Erik P. de Vink:

Formalising Receipt-Freeness. 476-488 - Mohammed Assora, Ayoub Shirvani:

Enhancing the Security and Efficiency of 3-D Secure. 489-501 - David von Oheimb, Jorge Cuéllar:

Designing and Verifying Core Protocols for Location Privacy. 502-516
Information Systems Security
- Mila Katzarova, Andrew Simpson

:
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. 517-529 - José Manuel Torres, Jose M. Sarriegi, Javier Santos

, Nicolás Serrano:
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. 530-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














