- 2006
- Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES (Short Paper). ICICS 2006: 112-121 - Billy Bob Brumley:
Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). ICICS 2006: 469-478 - Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan:
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). ICICS 2006: 322-331 - Geir Olav Dyrkolbotn, Einar Snekkenes:
A Wireless Covert Channel on Smart Cards (Short Paper). ICICS 2006: 249-259 - Richard J. Edell, Peter Kruus, Uri Meth:
Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). ICICS 2006: 499-506 - Errin W. Fulp:
An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). ICICS 2006: 292-301 - Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh:
A Fast RSA Implementation on Itanium 2 Processor. ICICS 2006: 507-518 - Benoît Garbinato, Ian Rickebusch:
A Topological Condition for Solving Fair Exchange in Byzantine Environments. ICICS 2006: 30-49 - He Ge:
An Anonymous Authentication Scheme for Identification Card. ICICS 2006: 238-248 - Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan:
Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). ICICS 2006: 546-555 - Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 - Himanshu Khurana, Jin Heo, Meenal Pant:
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. ICICS 2006: 260-281 - Jiangtao Li, Ninghui Li:
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138 - Chae Hoon Lim, Taekyoung Kwon:
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. ICICS 2006: 1-20 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). ICICS 2006: 282-291 - Ziqing Mao, Ninghui Li, William H. Winsborough:
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173 - Carla Marceau, Matthew Stillerman:
Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). ICICS 2006: 369-378 - Michael de Mare, Rebecca N. Wright:
Secure Set Membership Using 3Sat. ICICS 2006: 452-468 - Evan Martin, Tao Xie, Ting Yu:
Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158 - Tatsuyuki Matsushita, Hideki Imai:
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. ICICS 2006: 92-111 - Oleksiy Mazhelis, Seppo Puuronen, Mika Raento:
Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario. ICICS 2006: 302-321 - James A. Muir:
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. ICICS 2006: 420-434 - Svetla Nikova, Christian Rechberger, Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 - Karsten Nohl, David Evans:
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). ICICS 2006: 228-237 - Jörg Platte, Raúl Durán Díaz, Edwin Naroska:
An Operating System Design for the Security Architecture for Microprocessors. ICICS 2006: 174-189 - Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong:
Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. ICICS 2006: 210-227 - Kyung-Ah Shim:
An Identity-Based Proxy Signature Scheme from Pairings. ICICS 2006: 60-71 - Kyung-Ah Shim, Seung-Hyun Seo:
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). ICICS 2006: 410-419 - Chiu C. Tan, Qun Li:
A Robust and Secure RFID-Based Pedigree System (Short Paper). ICICS 2006: 21-29 - Jeanette Tsang, Konstantin Beznosov:
A Security Analysis of the Precise Time Protocol (Short Paper). ICICS 2006: 50-59