Search dblp for Publications

export results for "toc:db/conf/icics/icics2006.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icics/AciicmezK06,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Trace-Driven Cache Attacks on {AES} (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_9},
  doi          = {10.1007/11935308\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AciicmezK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Brumley06,
  author       = {Billy Bob Brumley},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Left-to-Right Signed-Bit \emph{tau}-Adic Representations of \emph{n}
                  Integers (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {469--478},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_33},
  doi          = {10.1007/11935308\_33},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Brumley06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DengHXY06,
  author       = {Lingli Deng and
                  Yeping He and
                  Ziyao Xu and
                  Chunyang Yuan},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {An Enhanced N-Way Exchange-Based Incentive Scheme for {P2P} File Sharing
                  (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {322--331},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_23},
  doi          = {10.1007/11935308\_23},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DengHXY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DyrkolbotnS06,
  author       = {Geir Olav Dyrkolbotn and
                  Einar Snekkenes},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Wireless Covert Channel on Smart Cards (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_18},
  doi          = {10.1007/11935308\_18},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DyrkolbotnS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/EdellKM06,
  author       = {Richard J. Edell and
                  Peter Kruus and
                  Uri Meth},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Tracing {HTTP} Activity Through Non-cooperating {HTTP} Proxies (Short
                  Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {499--506},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_35},
  doi          = {10.1007/11935308\_35},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/EdellKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Fulp06,
  author       = {Errin W. Fulp},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {An Independent Function-Parallel Firewall Architecture for High-Speed
                  Networks (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {292--301},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_21},
  doi          = {10.1007/11935308\_21},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Fulp06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FurukawaTI06,
  author       = {Kazuyoshi Furukawa and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Fast {RSA} Implementation on Itanium 2 Processor},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {507--518},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_36},
  doi          = {10.1007/11935308\_36},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/FurukawaTI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GarbinatoR06,
  author       = {Beno{\^{\i}}t Garbinato and
                  Ian Rickebusch},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Topological Condition for Solving Fair Exchange in Byzantine Environments},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {30--49},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_3},
  doi          = {10.1007/11935308\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/GarbinatoR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Ge06,
  author       = {He Ge},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {An Anonymous Authentication Scheme for Identification Card},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_17},
  doi          = {10.1007/11935308\_17},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Ge06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GuLYL06,
  author       = {Xiaozhuo Gu and
                  Yufeng Li and
                  Jianzu Yang and
                  Julong Lan},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Hardware-and-Software-Based Security Architecture for Broadband Router
                  (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {546--555},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_39},
  doi          = {10.1007/11935308\_39},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/GuLYL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HuangSMW06,
  author       = {Xinyi Huang and
                  Willy Susilo and
                  Yi Mu and
                  Wei Wu},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Universal Designated Verifier Signature Without Delegatability},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {479--498},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_34},
  doi          = {10.1007/11935308\_34},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HuangSMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KhuranaHP06,
  author       = {Himanshu Khurana and
                  Jin Heo and
                  Meenal Pant},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {From Proxy Encryption Primitives to a Deployable Secure-Mailing-List
                  Solution},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {260--281},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_19},
  doi          = {10.1007/11935308\_19},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/KhuranaHP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiL06,
  author       = {Jiangtao Li and
                  Ninghui Li},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Construction for General and Efficient Oblivious Commitment Based
                  Envelope Protocols},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {122--138},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_10},
  doi          = {10.1007/11935308\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LimK06,
  author       = {Chae Hoon Lim and
                  Taekyoung Kwon},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Strong and Robust {RFID} Authentication Enabling Perfect Ownership
                  Transfer},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_1},
  doi          = {10.1007/11935308\_1},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LimK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Macia-FernandezDG06,
  author       = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Pedro Garcia{-}Teodoro},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Mathematical Foundations for the Design of a Low-Rate DoS Attack to
                  Iterative Servers (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {282--291},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_20},
  doi          = {10.1007/11935308\_20},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Macia-FernandezDG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaoLW06,
  author       = {Ziqing Mao and
                  Ninghui Li and
                  William H. Winsborough},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Distributed Credential Chain Discovery in Trust Management with Parameterized
                  Roles and Constraints (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {159--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_12},
  doi          = {10.1007/11935308\_12},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaoLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MarceauS06,
  author       = {Carla Marceau and
                  Matthew Stillerman},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Modular Behavior Profiles in Systems with Shared Libraries (Short
                  Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {369--378},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_26},
  doi          = {10.1007/11935308\_26},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MarceauS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MareW06,
  author       = {Michael de Mare and
                  Rebecca N. Wright},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Secure Set Membership Using 3Sat},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {452--468},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_32},
  doi          = {10.1007/11935308\_32},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MareW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MartinXY06,
  author       = {Evan Martin and
                  Tao Xie and
                  Ting Yu},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Defining and Measuring Policy Coverage in Testing Access Control Policies},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {139--158},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_11},
  doi          = {10.1007/11935308\_11},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/MartinXY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MatsushitaI06,
  author       = {Tatsuyuki Matsushita and
                  Hideki Imai},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext
                  Size},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_8},
  doi          = {10.1007/11935308\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MatsushitaI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MazhelisPR06,
  author       = {Oleksiy Mazhelis and
                  Seppo Puuronen and
                  Mika Raento},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case
                  and Best-Case Scenario},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {302--321},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_22},
  doi          = {10.1007/11935308\_22},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MazhelisPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Muir06,
  author       = {James A. Muir},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Seifert's {RSA} Fault Attack: Simplified Analysis and Generalizations},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {420--434},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_30},
  doi          = {10.1007/11935308\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Muir06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NikovaRR06,
  author       = {Svetla Nikova and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Threshold Implementations Against Side-Channel Attacks and Glitches},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {529--545},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_38},
  doi          = {10.1007/11935308\_38},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/NikovaRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NohlE06,
  author       = {Karsten Nohl and
                  David Evans},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Quantifying Information Leakage in Tree-Based Hash Protocols (Short
                  Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {228--237},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_16},
  doi          = {10.1007/11935308\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/NohlE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PlatteDN06,
  author       = {J{\"{o}}rg Platte and
                  Ra{\'{u}}l Dur{\'{a}}n D{\'{\i}}az and
                  Edwin Naroska},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {An Operating System Design for the Security Architecture for Microprocessors},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_13},
  doi          = {10.1007/11935308\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/PlatteDN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SangSTX06,
  author       = {Yingpeng Sang and
                  Hong Shen and
                  Yasuo Tan and
                  Naixue Xiong},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Efficient Protocols for Privacy Preserving Matching Against Distributed
                  Datasets},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {210--227},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_15},
  doi          = {10.1007/11935308\_15},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SangSTX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Shim06,
  author       = {Kyung{-}Ah Shim},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {An Identity-Based Proxy Signature Scheme from Pairings},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_5},
  doi          = {10.1007/11935308\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Shim06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ShimS06,
  author       = {Kyung{-}Ah Shim and
                  Seung{-}Hyun Seo},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from
                  Bilinear Pairings (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {410--419},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_29},
  doi          = {10.1007/11935308\_29},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ShimS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TanL06,
  author       = {Chiu C. Tan and
                  Qun Li},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Robust and Secure RFID-Based Pedigree System (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {21--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_2},
  doi          = {10.1007/11935308\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TanL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TsangB06,
  author       = {Jeanette Tsang and
                  Konstantin Beznosov},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Security Analysis of the Precise Time Protocol (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {50--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_4},
  doi          = {10.1007/11935308\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TsangB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/VenkatakrishnanXDS06,
  author       = {V. N. Venkatakrishnan and
                  Wei Xu and
                  Daniel C. DuVarney and
                  R. Sekar},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Provably Correct Runtime Enforcement of Non-interference Properties},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {332--351},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_24},
  doi          = {10.1007/11935308\_24},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/VenkatakrishnanXDS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangB06,
  author       = {Guilin Wang and
                  Feng Bao},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Cryptanalysis of Timestamp-Based Password Authentication Schemes Using
                  Smart Cards},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {399--409},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_28},
  doi          = {10.1007/11935308\_28},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangBZ06,
  author       = {Guilin Wang and
                  Feng Bao and
                  Jianying Zhou},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {The Fairness of Perfect Concurrent Signatures},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {435--451},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_31},
  doi          = {10.1007/11935308\_31},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangBZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangL06,
  author       = {Haodong Wang and
                  Qun Li},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Efficient Implementation of Public Key Cryptosystems on Mote Sensors
                  (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {519--528},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_37},
  doi          = {10.1007/11935308\_37},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuZC06,
  author       = {Yongdong Wu and
                  Zhigang Zhao and
                  Tian Wei Chui},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {An Attack on SMC-Based Software Protection},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {352--368},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_25},
  doi          = {10.1007/11935308\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WuZC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangWWD06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Formal Analysis and Systematic Construction of Two-Factor Authentication
                  Scheme (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {82--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_7},
  doi          = {10.1007/11935308\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YangWWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YaoFAT06,
  author       = {Danfeng Yao and
                  Keith B. Frikken and
                  Mikhail J. Atallah and
                  Roberto Tamassia},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Point-Based Trust: Define How Much Privacy Is Worth},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_14},
  doi          = {10.1007/11935308\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YaoFAT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YounanJP06,
  author       = {Yves Younan and
                  Wouter Joosen and
                  Frank Piessens},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Efficient Protection Against Heap-Based Buffer Overflows Without Resorting
                  to Magic},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {379--398},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_27},
  doi          = {10.1007/11935308\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YounanJP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhuZ06,
  author       = {Huafei Zhu and
                  Jianying Zhou},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks
                  (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {72--81},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_6},
  doi          = {10.1007/11935308\_6},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhuZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2006,
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308},
  doi          = {10.1007/11935308},
  isbn         = {3-540-49496-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}