| 2006 | A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications. Chenlin Huang, Huaping Hu, Zhiying Wang |
| 2006 | A Framework for Specifying and Managing Security Requirements in Collaborative Systems. Stephen S. Yau, Zhaoji Chen |
| 2006 | A Group Based Reputation System for P2P Networks. Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng |
| 2006 | A New ID-Based Broadcast Encryption Scheme. Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang |
| 2006 | A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. Junaid Ahsenali Chaudhry, Seungkyu Park |
| 2006 | A Novel Rate Limit Algorithm Against Meek DDoS Attacks. Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang |
| 2006 | A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn |
| 2006 | A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. Ming Li, Shengquan Wang, Wei Zhao |
| 2006 | A Risk Assessment Model for Enterprise Network Security. Fu-Hong Yang, Chi-Hung Chi, Lin Liu |
| 2006 | A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment. Yun-Long Sie, Te-Hua Wang, Hsuan-Pu Chang, Shu-Nu Chang, Timothy K. Shih |
| 2006 | A Security Management Framework with Roaming Coordinator for Pervasive Services. Minsoo Lee, Sehyun Park, Sungik Jun |
| 2006 | A Social Network-Based Trust Model for the Semantic Web. Yu Zhang, Huajun Chen, Zhaohui Wu |
| 2006 | A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases. Yingyuan Xiao, Yunsheng Liu, Xiangyang Chen, Xiaofeng Liu |
| 2006 | Active Fault-Tolerant System for Open Distributed Computing. Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida |
| 2006 | An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü |
| 2006 | An Approach for Trusted Interoperation in a Multidomain Environment. Yuqing Sun, Peng Pan, Xiangxu Meng |
| 2006 | An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. Iuon-Chang Lin, Chin-Chen Chang |
| 2006 | An Improved Global Trust Value Computing Method in P2P System. Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao |
| 2006 | An Integration Framework for Trustworthy Transactions. Yonghwan Lee, Dugki Min |
| 2006 | Automated Abduction for Computer Forensics. Andrei Doncescu, Katsumi Inoue |
| 2006 | Automatic Composition of Secure Workflows. Marc Lelarge, Zhen Liu, Anton Riabov |
| 2006 | Autonomic Group Location Update for Mobile Networks. Lai Tu, Furong Wang, Fan Zhang, Jian Zhang |
| 2006 | Autonomic Interference Avoidance with Extended Shortest Path Algorithm. Yong Cui, Hao Che, Constantino M. Lagoa, ZhiMei Zheng |
| 2006 | Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks. Khaled Ragab, Akinori Yonezawa |
| 2006 | Autonomic Trust Management in a Component Based Software System. Zheng Yan, Ronan MacLaverty |
| 2006 | Autonomic and Trusted Computing Paradigms. Xiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas |
| 2006 | Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings Laurence Tianruo Yang, Hai Jin, Jianhua Ma, Theo Ungerer |
| 2006 | Bayesian Network Based Trust Management. Yong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, Lejian Liao |
| 2006 | Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou |
| 2006 | Development and Runtime Support for Situation-Aware Security in Autonomic Computing. Stephen S. Yau, Yisheng Yao, Min Yan |
| 2006 | Efficient Signcryption Without Random Oracles. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang |
| 2006 | Emergence in Organic Computing Systems: Discussion of a Controversial Concept. Christian Müller-Schloer, Bernhard Sick |
| 2006 | Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project. Pierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur |
| 2006 | FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS. Jae-Woo Chang, Young-Chang Kim |
| 2006 | Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems. Wei Luo, Fumin Yang, Liping Pang, Xiao Qin |
| 2006 | Formal Modeling and Verification of Systems with Self-x Properties. Matthias Güdemann, Frank Ortmeier, Wolfgang Reif |
| 2006 | From Components to Autonomic Elements Using Negotiable Contracts. Hervé Chang, Philippe Collet, Alain Ozanne, Nicolas Rivierre |
| 2006 | Fuzzy Model Tuning for Intrusion Detection Systems. Zhenwei Yu, Jeffrey J. P. Tsai |
| 2006 | Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks. Yanxiang He, Jun Xiao, Naixue Xiong, Laurence Tianruo Yang |
| 2006 | MTrust: A Reputation-Based Trust Model for a Mobile Agent System. Suphithat Songsiri |
| 2006 | Managing Trust in Distributed Agent Systems. Stephen S. Yau |
| 2006 | Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems. A. Reza Haydarlou, Benno J. Overeinder, Michel A. Oey, Frances M. T. Brazier |
| 2006 | On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. Christian Veigner, Chunming Rong |
| 2006 | PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail |
| 2006 | Remote Authentication with Forward Security. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu |
| 2006 | Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. Yongzhong Zhang, Jianhua Yang, Chunming Ye |
| 2006 | Self Awareness and Adaptive Traffic Signal Control System for Smart World. Lawrence Y. Deng, Dong-Liang Lee |
| 2006 | Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng |
| 2006 | Self-configuration Via Cooperative Social Behavior. Wolfgang Trumler, Robert Klaus, Theo Ungerer |
| 2006 | Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li |
| 2006 | System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. Won Jay Song, Im Sook Há, Mun Kee Choi |
| 2006 | TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System. Sirui Yang, Hai Jin, Xuping Tu |
| 2006 | TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting. Yun Tang, Lifeng Sun, Jian-Guang Luo, Shiqiang Yang, Yuzhuo Zhong |
| 2006 | Toward Trust Management in Autonomic and Coordination Applications. Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü |
| 2006 | Towards Ontology-Based Embedded Services. Ghadi Mahmoudi, Christian Müller-Schloer |
| 2006 | Towards a Standards-Based Autonomic Context Management System. Jadwiga Indulska, Karen Henricksen, Peizhao Hu |
| 2006 | Trusted Priority Control Design for Information Networks Based on Sociotechnology. Noriaki Yoshikai |
| 2006 | Two Novel Packet Marking Schemes for IP Traceback. Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding |
| 2006 | Ubisafe Computing: Vision and Challenges (I). Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence Tianruo Yang, Runhe Huang, Qun Jin |
| 2006 | Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang |