| 2006 | A control flow obfuscation method to discourage malicious tampering of software codes. Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
| 2006 | A distributed key assignment protocol for secure multicast based on proxy cryptography. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei |
| 2006 | A general design towards secure ad-hoc collaboration. Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu |
| 2006 | A refined look at Bernstein's AES side-channel analysis. Michael Neve, Jean-Pierre Seifert, Zhenghong Wang |
| 2006 | A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. Wen-Guey Tzeng |
| 2006 | Addressing the shortcomings of one-way chains. Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil |
| 2006 | An attack-localizing watermarking scheme for natural language documents. Gaurav Gupta, Josef Pieprzyk, Huaxiong Wang |
| 2006 | An efficient broadcast authentication scheme in wireless sensor networks. Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh |
| 2006 | An efficient key establishment scheme for secure aggregating sensor networks. Erik-Oliver Blaß, Martina Zitterbart |
| 2006 | An efficient secure communication between set-top box and smart card in DTV broadcasting. Jiun-Tze Lai, Ting-Wei Hou |
| 2006 | Analysis of traceability attack on Camenisch et al.'s blind signature schemes. Lin-Chuan Wu |
| 2006 | Application security support in the operating system kernel. Manigandan Radhakrishnan, Jon A. Solworth |
| 2006 | Approvability. Jon A. Solworth |
| 2006 | Attack graph generation and analysis. Jeannette M. Wing |
| 2006 | Augmenting storage with an intrusion response primitive to ensure the security of critical data. Ashish Gehani, Surendar Chandra, Gershon Kedem |
| 2006 | Can machine learning be secure? Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar |
| 2006 | Certified mailing lists. Himanshu Khurana, Hyung-Seok Hahm |
| 2006 | Collusion secure convolutional fingerprinting information codes. Yan Zhu, Wei Zou, Xinshan Zhu |
| 2006 | Continuous fingerprints classification by symmetrical filters. Jun Li, Wei-Yun Yau, Han Wang |
| 2006 | Cryptanalysis of the "Grain" family of stream ciphers. Alexander Maximov |
| 2006 | Democratic group signatures: on an example of joint ventures. Mark Manulis |
| 2006 | Design and implementation of a reconfigurable hardware for secure embedded systems. Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann |
| 2006 | Design space and analysis of worm defense strategies. David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song |
| 2006 | Designated group credentials. Ching Yu Ng, Willy Susilo, Yi Mu |
| 2006 | Digital invisible ink: revealing true secrets via attacking. Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu |
| 2006 | Digitally signed document sanitizing scheme based on bilinear maps. Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai |
| 2006 | Dynamic rule-ordering optimization for high-speed firewall filtering. Hazem H. Hamed, Ehab Al-Shaer |
| 2006 | Emergent properties in ad-hoc networks: a security perspective. Virgil D. Gligor |
| 2006 | Finding the original point set hidden among chaff. Ee-Chien Chang, Ren Shen, Francis Weijian Teo |
| 2006 | Forgery attack on the RPC incremental unforgeable encryption scheme. Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh |
| 2006 | Fortifying password authentication in integrated healthcare delivery systems. Yanjiang Yang, Robert H. Deng, Feng Bao |
| 2006 | Identity-based registry for secure interdomain routing. E-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park |
| 2006 | Image-adaptive watermarking based on perceptually shaping watermark blockwise. Xinshan Zhu, Yong Gao, Yan Zhu |
| 2006 | Improving secure server performance by re-balancing SSL/TLS handshakes. Claude Castelluccia, Einar Mykletun, Gene Tsudik |
| 2006 | Lightweight, pollution-attack resistant multicast authentication scheme. Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin |
| 2006 | Measuring intrusion detection capability: an information-theoretic approach. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
| 2006 | Periodicity, complementarity and complexity of 2-adic FCSR combiner generators. S. Anand, Gurumurthi V. Ramanan |
| 2006 | Policy-based encryption schemes from bilinear pairings. Walid Bagga, Refik Molva, Stefano Crosta |
| 2006 | Privacy-preserving semantic interoperation and access control of heterogeneous databases. Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri |
| 2006 | Problems on the MR micropayment schemes. Masahiro Mambo, Moisés Salinas-Rosales, Kazuo Ohta, Noboru Kunihiro |
| 2006 | Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006 Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia |
| 2006 | Provably secure password-based authentication in TLS. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
| 2006 | Publicly verifiable ownership protection for relational databases. Yingjiu Li, Robert Huijie Deng |
| 2006 | Quadtree based perceptual watermarking scheme. Shan Ming Tsu, W. S. Hsieh |
| 2006 | Restricted message signing. Toshihiko Matsuo |
| 2006 | Ring signatures without random oracles. Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen |
| 2006 | Safety analysis of usage control authorization models. Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce |
| 2006 | Secure information sharing enabled by Trusted Computing and PEI models. Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang |
| 2006 | Security vulnerabilities: from measurements to design. Ravishankar K. Iyer |
| 2006 | Self-organised group key management for ad hoc networks. Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo |
| 2006 | Software integrity protection using timed executable agents. Juan A. Garay, Lorenz Huelsbergen |
| 2006 | Supporting location-based conditions in access control policies. Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2006 | TRUST: in cyberspace and beyond. Shankar Sastry |
| 2006 | Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. Soo-Chang Pei, Yi-Chong Zeng |
| 2006 | Time series modeling for IDS alert management. Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier |