default search action
1st AsiaCCS 2006: Taipei, Taiwan
- Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia:
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM 2006, ISBN 1-59593-272-0
Invited Talks
- Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective. 1 - Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang:
Secure information sharing enabled by Trusted Computing and PEI models. 2-12 - Shankar Sastry:
TRUST: in cyberspace and beyond. 13 - Jeannette M. Wing:
Attack graph generation and analysis. 14 - Ravishankar K. Iyer:
Security vulnerabilities: from measurements to design. 15 - Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar:
Can machine learning be secure? 16-25
Security protocols
- Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving secure server performance by re-balancing SSL/TLS handshakes. 26-34 - Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Provably secure password-based authentication in TLS. 35-45 - Himanshu Khurana, Hyung-Seok Hahm:
Certified mailing lists. 46-58 - Ching Yu Ng, Willy Susilo, Yi Mu:
Designated group credentials. 59-65
Database security
- Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri:
Privacy-preserving semantic interoperation and access control of heterogeneous databases. 66-77 - Yingjiu Li, Robert Huijie Deng:
Publicly verifiable ownership protection for relational databases. 78-89
Intrusion detection and modeling
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach. 90-101 - Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier:
Time series modeling for IDS alert management. 102-113 - Ashish Gehani, Surendar Chandra, Gershon Kedem:
Augmenting storage with an intrusion response primitive to ensure the security of critical data. 114-124 - David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song:
Design space and analysis of worm defense strategies. 125-137
P2P & ad hoc networks
- Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo:
Self-organised group key management for ad hoc networks. 138-147 - Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin:
Lightweight, pollution-attack resistant multicast authentication scheme. 148-156
Digital rights management and watermarking
- Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents. 157-165 - Soo-Chang Pei, Yi-Chong Zeng:
Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. 166-174 - Xinshan Zhu, Yong Gao, Yan Zhu:
Image-adaptive watermarking based on perceptually shaping watermark blockwise. 175-181 - Ee-Chien Chang, Ren Shen, Francis Weijian Teo:
Finding the original point set hidden among chaff. 182-188
Software security
- Juan A. Garay, Lorenz Huelsbergen:
Software integrity protection using timed executable agents. 189-200 - Manigandan Radhakrishnan, Jon A. Solworth:
Application security support in the operating system kernel. 201-211
Access control and authorization
- Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Supporting location-based conditions in access control policies. 212-222 - Wen-Guey Tzeng:
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. 223-230 - Jon A. Solworth:
Approvability. 231-242 - Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce:
Safety analysis of usage control authorization models. 243-254
Authentication and biometrics
- Yanjiang Yang, Robert H. Deng, Feng Bao:
Fortifying password authentication in integrated healthcare delivery systems. 255-265 - Yan Zhu, Wei Zou, Xinshan Zhu:
Collusion secure convolutional fingerprinting information codes. 266-274
Cryptosystem and analysis
- S. Anand, Gurumurthi V. Ramanan:
Periodicity, complementarity and complexity of 2-adic FCSR combiner generators. 275-282 - Alexander Maximov:
Cryptanalysis of the "Grain" family of stream ciphers. 283-288 - Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil:
Addressing the shortcomings of one-way chains. 289-296 - Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen:
Ring signatures without random oracles. 297-302
Wireless sensor networks
- Erik-Oliver Blaß, Martina Zitterbart:
An efficient key establishment scheme for secure aggregating sensor networks. 303-310 - Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh:
An efficient broadcast authentication scheme in wireless sensor networks. 311-320
Secure routing and firewall
- E-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park:
Identity-based registry for secure interdomain routing. 321-331 - Hazem H. Hamed, Ehab Al-Shaer:
Dynamic rule-ordering optimization for high-speed firewall filtering. 332-342 - Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:
Digitally signed document sanitizing scheme based on bilinear maps. 343-354
Fast abstract session: multimedia security
- Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu:
Digital invisible ink: revealing true secrets via attacking. 355 - Shan Ming Tsu, W. S. Hsieh:
Quadtree based perceptual watermarking scheme. 356 - Jun Li, Wei-Yun Yau, Han Wang:
Continuous fingerprints classification by symmetrical filters. 357
Fast abstract session: network security
- Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu:
A general design towards secure ad-hoc collaboration. 358 - Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography. 359 - Jiun-Tze Lai, Ting-Wei Hou:
An efficient secure communication between set-top box and smart card in DTV broadcasting. 360 - Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh:
Forgery attack on the RPC incremental unforgeable encryption scheme. 361 - Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao:
A control flow obfuscation method to discourage malicious tampering of software codes. 362 - Masahiro Mambo, Moisés Salinas-Rosales, Kazuo Ohta, Noboru Kunihiro:
Problems on the MR micropayment schemes. 363 - Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann:
Design and implementation of a reconfigurable hardware for secure embedded systems. 364
Fast abstract session: digital signature
- Mark Manulis:
Democratic group signatures: on an example of joint ventures. 365 - Lin-Chuan Wu:
Analysis of traceability attack on Camenisch et al.'s blind signature schemes. 366 - Toshihiko Matsuo:
Restricted message signing. 367
Fast abstract session: cryptosystem
- Walid Bagga, Refik Molva, Stefano Crosta:
Policy-based encryption schemes from bilinear pairings. 368 - Michael Neve, Jean-Pierre Seifert, Zhenghong Wang:
A refined look at Bernstein's AES side-channel analysis. 369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.