| 2006 | A Diffie-Hellman Key Exchange Protocol Without Random Oracles. Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee |
| 2006 | A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over Jianqin Zhou, Qiang Zheng |
| 2006 | A Multi-agent Cooperative Model and System for Integrated Security Monitoring. Xianxian Li, Lijun Liu |
| 2006 | A Note of Perfect Nonlinear Functions. Xiyong Zhang, Hua Guo, Jinjiang Yuan |
| 2006 | Achieving Multicast Stream Authentication Using MDS Codes. Christophe Tartary, Huaxiong Wang |
| 2006 | An Immune-Based Model for Service Survivability. Jinquan Zeng, Xiaojie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu |
| 2006 | Authenticated Group Key Agreement for Multicast. Liming Wang, Chuan-Kun Wu |
| 2006 | Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. Hongsong Shi, Mingxing He, Zhiguang Qin |
| 2006 | Bitslice Implementation of AES. Chester Rebeiro, A. David Selvakumar, A. S. L. Devi |
| 2006 | Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang |
| 2006 | Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
| 2006 | Cooperative Intrusion Detection for Web Applications. Nathalie Dagorn |
| 2006 | Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings David Pointcheval, Yi Mu, Kefei Chen |
| 2006 | Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. Jian Kang, Yuan Zhang, Jiu-bin Ju |
| 2006 | Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. Rongxing Lu, Zhenfu Cao, Xiaolei Dong |
| 2006 | Efficient Identity-Based Encryption with Tight Security Reduction. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang |
| 2006 | Efficient Mutual Data Authentication Using Manually Authenticated Strings. Sven Laur, Kaisa Nyberg |
| 2006 | Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. Jianhua Yang, Byong Lee, Yongzhong Zhang |
| 2006 | Improved Collision Attack on Reduced Round Camellia. Guan Jie, Zhongya Zhang |
| 2006 | Security Model of Proxy-Multi Signature Schemes. Feng Cao, Zhenfu Cao |
| 2006 | Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. Sujing Zhou, Dongdai Lin |
| 2006 | Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim |
| 2006 | Smart Architecture for High-Speed Intrusion Detection and Prevention Systems. Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang |
| 2006 | Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
| 2006 | Steganalysis Based on Differential Statistics. Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan |
| 2006 | Watermarking Essential Data Structures for Copyright Protection. Qutaiba Albluwi, Ibrahim Kamel |
| 2006 | X Lan Yu, Willy Susilo, Reihaneh Safavi-Naini |