default search action
Search dblp for Publications
export results for "toc:db/conf/icics/icics2006.bht:"
@inproceedings{DBLP:conf/icics/AciicmezK06, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Trace-Driven Cache Attacks on {AES} (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {112--121}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_9}, doi = {10.1007/11935308\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AciicmezK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Brumley06, author = {Billy Bob Brumley}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Left-to-Right Signed-Bit \emph{tau}-Adic Representations of \emph{n} Integers (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {469--478}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_33}, doi = {10.1007/11935308\_33}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Brumley06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DengHXY06, author = {Lingli Deng and Yeping He and Ziyao Xu and Chunyang Yuan}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {An Enhanced N-Way Exchange-Based Incentive Scheme for {P2P} File Sharing (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {322--331}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_23}, doi = {10.1007/11935308\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/DengHXY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DyrkolbotnS06, author = {Geir Olav Dyrkolbotn and Einar Snekkenes}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Wireless Covert Channel on Smart Cards (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {249--259}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_18}, doi = {10.1007/11935308\_18}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/DyrkolbotnS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/EdellKM06, author = {Richard J. Edell and Peter Kruus and Uri Meth}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Tracing {HTTP} Activity Through Non-cooperating {HTTP} Proxies (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {499--506}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_35}, doi = {10.1007/11935308\_35}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/EdellKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Fulp06, author = {Errin W. Fulp}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {292--301}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_21}, doi = {10.1007/11935308\_21}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Fulp06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FurukawaTI06, author = {Kazuyoshi Furukawa and Masahiko Takenaka and Kouichi Itoh}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Fast {RSA} Implementation on Itanium 2 Processor}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {507--518}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_36}, doi = {10.1007/11935308\_36}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/FurukawaTI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GarbinatoR06, author = {Beno{\^{\i}}t Garbinato and Ian Rickebusch}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Topological Condition for Solving Fair Exchange in Byzantine Environments}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {30--49}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_3}, doi = {10.1007/11935308\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/GarbinatoR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Ge06, author = {He Ge}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {An Anonymous Authentication Scheme for Identification Card}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {238--248}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_17}, doi = {10.1007/11935308\_17}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Ge06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GuLYL06, author = {Xiaozhuo Gu and Yufeng Li and Jianzu Yang and Julong Lan}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {546--555}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_39}, doi = {10.1007/11935308\_39}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/GuLYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HuangSMW06, author = {Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Universal Designated Verifier Signature Without Delegatability}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {479--498}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_34}, doi = {10.1007/11935308\_34}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HuangSMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KhuranaHP06, author = {Himanshu Khurana and Jin Heo and Meenal Pant}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {260--281}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_19}, doi = {10.1007/11935308\_19}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/KhuranaHP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiL06, author = {Jiangtao Li and Ninghui Li}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {122--138}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_10}, doi = {10.1007/11935308\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LimK06, author = {Chae Hoon Lim and Taekyoung Kwon}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Strong and Robust {RFID} Authentication Enabling Perfect Ownership Transfer}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {1--20}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_1}, doi = {10.1007/11935308\_1}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LimK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Macia-FernandezDG06, author = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Pedro Garcia{-}Teodoro}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {282--291}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_20}, doi = {10.1007/11935308\_20}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Macia-FernandezDG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaoLW06, author = {Ziqing Mao and Ninghui Li and William H. Winsborough}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {159--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_12}, doi = {10.1007/11935308\_12}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaoLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MarceauS06, author = {Carla Marceau and Matthew Stillerman}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {369--378}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_26}, doi = {10.1007/11935308\_26}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MarceauS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MareW06, author = {Michael de Mare and Rebecca N. Wright}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Secure Set Membership Using 3Sat}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {452--468}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_32}, doi = {10.1007/11935308\_32}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MareW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MartinXY06, author = {Evan Martin and Tao Xie and Ting Yu}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Defining and Measuring Policy Coverage in Testing Access Control Policies}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {139--158}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_11}, doi = {10.1007/11935308\_11}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MartinXY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MatsushitaI06, author = {Tatsuyuki Matsushita and Hideki Imai}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {92--111}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_8}, doi = {10.1007/11935308\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MatsushitaI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MazhelisPR06, author = {Oleksiy Mazhelis and Seppo Puuronen and Mika Raento}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {302--321}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_22}, doi = {10.1007/11935308\_22}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MazhelisPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Muir06, author = {James A. Muir}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Seifert's {RSA} Fault Attack: Simplified Analysis and Generalizations}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {420--434}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_30}, doi = {10.1007/11935308\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Muir06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NikovaRR06, author = {Svetla Nikova and Christian Rechberger and Vincent Rijmen}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Threshold Implementations Against Side-Channel Attacks and Glitches}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {529--545}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_38}, doi = {10.1007/11935308\_38}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/NikovaRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NohlE06, author = {Karsten Nohl and David Evans}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {228--237}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_16}, doi = {10.1007/11935308\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/NohlE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PlatteDN06, author = {J{\"{o}}rg Platte and Ra{\'{u}}l Dur{\'{a}}n D{\'{\i}}az and Edwin Naroska}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {An Operating System Design for the Security Architecture for Microprocessors}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {174--189}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_13}, doi = {10.1007/11935308\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PlatteDN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SangSTX06, author = {Yingpeng Sang and Hong Shen and Yasuo Tan and Naixue Xiong}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {210--227}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_15}, doi = {10.1007/11935308\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SangSTX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Shim06, author = {Kyung{-}Ah Shim}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {An Identity-Based Proxy Signature Scheme from Pairings}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {60--71}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_5}, doi = {10.1007/11935308\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Shim06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ShimS06, author = {Kyung{-}Ah Shim and Seung{-}Hyun Seo}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {410--419}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_29}, doi = {10.1007/11935308\_29}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ShimS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TanL06, author = {Chiu C. Tan and Qun Li}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Robust and Secure RFID-Based Pedigree System (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {21--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_2}, doi = {10.1007/11935308\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/TanL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TsangB06, author = {Jeanette Tsang and Konstantin Beznosov}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Security Analysis of the Precise Time Protocol (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {50--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_4}, doi = {10.1007/11935308\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/TsangB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/VenkatakrishnanXDS06, author = {V. N. Venkatakrishnan and Wei Xu and Daniel C. DuVarney and R. Sekar}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Provably Correct Runtime Enforcement of Non-interference Properties}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {332--351}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_24}, doi = {10.1007/11935308\_24}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/VenkatakrishnanXDS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangB06, author = {Guilin Wang and Feng Bao}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {399--409}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_28}, doi = {10.1007/11935308\_28}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangBZ06, author = {Guilin Wang and Feng Bao and Jianying Zhou}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {The Fairness of Perfect Concurrent Signatures}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {435--451}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_31}, doi = {10.1007/11935308\_31}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangBZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangL06, author = {Haodong Wang and Qun Li}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {519--528}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_37}, doi = {10.1007/11935308\_37}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WuZC06, author = {Yongdong Wu and Zhigang Zhao and Tian Wei Chui}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {An Attack on SMC-Based Software Protection}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {352--368}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_25}, doi = {10.1007/11935308\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WuZC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangWWD06, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {82--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_7}, doi = {10.1007/11935308\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YangWWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YaoFAT06, author = {Danfeng Yao and Keith B. Frikken and Mikhail J. Atallah and Roberto Tamassia}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Point-Based Trust: Define How Much Privacy Is Worth}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {190--209}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_14}, doi = {10.1007/11935308\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YaoFAT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YounanJP06, author = {Yves Younan and Wouter Joosen and Frank Piessens}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {379--398}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_27}, doi = {10.1007/11935308\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YounanJP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhuZ06, author = {Huafei Zhu and Jianying Zhou}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {72--81}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_6}, doi = {10.1007/11935308\_6}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhuZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2006, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308}, doi = {10.1007/11935308}, isbn = {3-540-49496-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.