- V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar:
Provably Correct Runtime Enforcement of Non-interference Properties. ICICS 2006: 332-351 - Guilin Wang, Feng Bao:
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ICICS 2006: 399-409 - Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451 - Haodong Wang, Qun Li:
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). ICICS 2006: 519-528 - Yongdong Wu, Zhigang Zhao, Tian Wei Chui:
An Attack on SMC-Based Software Protection. ICICS 2006: 352-368 - Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91 - Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 - Yves Younan, Wouter Joosen, Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. ICICS 2006: 379-398 - Huafei Zhu, Jianying Zhou:
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81 - Peng Ning, Sihan Qing, Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0 [contents]