AsiaCCS A

55 papers

YearTitle / Authors
2006A control flow obfuscation method to discourage malicious tampering of software codes.
Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao
2006A distributed key assignment protocol for secure multicast based on proxy cryptography.
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
2006A general design towards secure ad-hoc collaboration.
Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu
2006A refined look at Bernstein's AES side-channel analysis.
Michael Neve, Jean-Pierre Seifert, Zhenghong Wang
2006A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
Wen-Guey Tzeng
2006Addressing the shortcomings of one-way chains.
Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil
2006An attack-localizing watermarking scheme for natural language documents.
Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang
2006An efficient broadcast authentication scheme in wireless sensor networks.
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh
2006An efficient key establishment scheme for secure aggregating sensor networks.
Erik-Oliver Blaß, Martina Zitterbart
2006An efficient secure communication between set-top box and smart card in DTV broadcasting.
Jiun-Tze Lai, Ting-Wei Hou
2006Analysis of traceability attack on Camenisch et al.'s blind signature schemes.
Lin-Chuan Wu
2006Application security support in the operating system kernel.
Manigandan Radhakrishnan, Jon A. Solworth
2006Approvability.
Jon A. Solworth
2006Attack graph generation and analysis.
Jeannette M. Wing
2006Augmenting storage with an intrusion response primitive to ensure the security of critical data.
Ashish Gehani, Surendar Chandra, Gershon Kedem
2006Can machine learning be secure?
Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar
2006Certified mailing lists.
Himanshu Khurana, Hyung-Seok Hahm
2006Collusion secure convolutional fingerprinting information codes.
Yan Zhu, Wei Zou, Xinshan Zhu
2006Continuous fingerprints classification by symmetrical filters.
Jun Li, Wei-Yun Yau, Han Wang
2006Cryptanalysis of the "Grain" family of stream ciphers.
Alexander Maximov
2006Democratic group signatures: on an example of joint ventures.
Mark Manulis
2006Design and implementation of a reconfigurable hardware for secure embedded systems.
Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann
2006Design space and analysis of worm defense strategies.
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song
2006Designated group credentials.
Ching Yu Ng, Willy Susilo, Yi Mu
2006Digital invisible ink: revealing true secrets via attacking.
Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu
2006Digitally signed document sanitizing scheme based on bilinear maps.
Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai
2006Dynamic rule-ordering optimization for high-speed firewall filtering.
Hazem H. Hamed, Ehab Al-Shaer
2006Emergent properties in ad-hoc networks: a security perspective.
Virgil D. Gligor
2006Finding the original point set hidden among chaff.
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
2006Forgery attack on the RPC incremental unforgeable encryption scheme.
Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh
2006Fortifying password authentication in integrated healthcare delivery systems.
Yanjiang Yang, Robert H. Deng, Feng Bao
2006Identity-based registry for secure interdomain routing.
E-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park
2006Image-adaptive watermarking based on perceptually shaping watermark blockwise.
Xinshan Zhu, Yong Gao, Yan Zhu
2006Improving secure server performance by re-balancing SSL/TLS handshakes.
Claude Castelluccia, Einar Mykletun, Gene Tsudik
2006Lightweight, pollution-attack resistant multicast authentication scheme.
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
2006Measuring intrusion detection capability: an information-theoretic approach.
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
2006Periodicity, complementarity and complexity of 2-adic FCSR combiner generators.
S. Anand, Gurumurthi V. Ramanan
2006Policy-based encryption schemes from bilinear pairings.
Walid Bagga, Refik Molva, Stefano Crosta
2006Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri
2006Problems on the MR micropayment schemes.
Masahiro Mambo, Moisés Salinas-Rosales, Kazuo Ohta, Noboru Kunihiro
2006Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006
Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia
2006Provably secure password-based authentication in TLS.
Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
2006Publicly verifiable ownership protection for relational databases.
Yingjiu Li, Robert Huijie Deng
2006Quadtree based perceptual watermarking scheme.
Shan Ming Tsu, W. S. Hsieh
2006Restricted message signing.
Toshihiko Matsuo
2006Ring signatures without random oracles.
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen
2006Safety analysis of usage control authorization models.
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce
2006Secure information sharing enabled by Trusted Computing and PEI models.
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
2006Security vulnerabilities: from measurements to design.
Ravishankar K. Iyer
2006Self-organised group key management for ad hoc networks.
Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
2006Software integrity protection using timed executable agents.
Juan A. Garay, Lorenz Huelsbergen
2006Supporting location-based conditions in access control policies.
Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
2006TRUST: in cyberspace and beyond.
Shankar Sastry
2006Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm.
Soo-Chang Pei, Yi-Chong Zeng
2006Time series modeling for IDS alert management.
Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier