


default search action
9. ISC 2006: Samos Island, Greece
- Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7
Software Security
- Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna:
Extending .NET Security to Unmanaged Code. 1-16 - Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. 17-31
Privacy and Anonymity
- Matthew Burnside, Angelos D. Keromytis:
Low Latency Anonymity with Mix Rings. 32-45 - George Danezis:
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. 46-59 - Maurizio Atzori:
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. 60-71 - Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest:
Protecting Data Privacy Through Hard-to-Reverse Negative Databases. 72-84
Block Ciphers and Hash Functions
- Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:
Related-Key Rectangle Attack on 42-Round SHACAL-2. 85-100 - Florian Mendel
, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
On the Collision Resistance of RIPEMD-160. 101-116
Digital Signatures
- Javier Herranz, Fabien Laguillaumie:
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. 117-130 - Dongvu Tonien, Willy Susilo
, Reihaneh Safavi-Naini:
Multi-party Concurrent Signatures. 131-145 - Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
:
Formal Security Model of Multisignatures. 146-160 - Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai:
Cryptanalysis of Variants of UOV. 161-170
Stream Ciphers
- Christophe De Cannière:
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. 171-186 - Yaniv Shaked, Avishai Wool
:
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. 187-202
Encryption I
- Ellen Jochemsz, Benne de Weger:
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. 203-216 - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. 217-232 - Walid Bagga, Refik Molva:
Collusion-Free Policy-Based Encryption. 233-245
Pervasive Computing
- István Zsolt Berta:
Using Multiple Smart Cards for Signing Messages at Malicious Terminals. 246-256 - Michal Ren, Tanmoy Kanti Das, Jianying Zhou:
Diverging Keys in Wireless Sensor Networks. 257-269
Encryption II
- Ulrich Huber, Ahmad-Reza Sadeghi:
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. 270-285 - Thomas Stütz, Andreas Uhl:
Transparent Image Encryption Using Progressive JPEG. 286-298
Network Security
- Vassilis Prevelakis, Sotiris Ioannidis:
Preserving TCP Connections Across Host Address Changes. 299-310 - André Zúquete
, Hugo Marques:
A Security Architecture for Protecting LAN Interactions. 311-326 - Igor V. Kotenko
, Alexander Ulanov:
Simulation of Internet DDoS Attacks and Defense. 327-342 - Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. 343-358
Watermarking and DRM
- Jie Guo, Yingjiu Li, Robert H. Deng
, Kefei Chen:
Rights Protection for Data Cubes. 359-372 - Huifang Yin, Jun Li:
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). 373-382
Intrusion Detection and Worms
- Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang:
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. 383-397 - Luciano Bononi, Carlo Tacconi:
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. 398-414 - Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee:
Anomaly Intrusion Detection Based on Clustering a Data Stream. 415-426 - Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald:
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. 427-442
Key Exchange
- SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Authentication and Key Exchange Protocol for Secure Credential Services. 443-458 - Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. 459-475
Security Protocols and Formal Methods
- Hugo L. Jonker, Erik P. de Vink:
Formalising Receipt-Freeness. 476-488 - Mohammed Assora, Ayoub Shirvani:
Enhancing the Security and Efficiency of 3-D Secure. 489-501 - David von Oheimb, Jorge Cuéllar:
Designing and Verifying Core Protocols for Location Privacy. 502-516
Information Systems Security
- Mila Katzarova, Andrew Simpson
:
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. 517-529 - José Manuel Torres, Jose M. Sarriegi, Javier Santos
, Nicolás Serrano:
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. 530-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.