| 2006 | A fully collusion resistant broadcast, trace, and revoke system. Dan Boneh, Brent Waters |
| 2006 | A natural language approach to automated cryptanalysis of two-time pads. Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield |
| 2006 | A scalable approach to attack graph generation. Xinming Ou, Wayne F. Boyer, Miles A. McQueen |
| 2006 | An effective defense against email spam laundering. Mengjun Xie, Heng Yin, Haining Wang |
| 2006 | Attribute-based encryption for fine-grained access control of encrypted data. Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters |
| 2006 | Beyond separation of duty: an algebra for specifying high-level security policies. Ninghui Li, Qihua Wang |
| 2006 | Computationally sound secrecy proofs by mechanized flow analysis. Michael Backes, Peeter Laud |
| 2006 | Data collection with self-enforcing privacy. Philippe Golle, Frank McSherry, Ilya Mironov |
| 2006 | Deniable authentication and key exchange. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
| 2006 | Dictionary attacks using keyboard acoustic emanations. Yigael Berger, Avishai Wool, Arie Yeredor |
| 2006 | Doppelganger: Better browser privacy without the bother. Umesh Shankar, Chris Karlof |
| 2006 | EXE: automatically generating inputs of death. Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler |
| 2006 | Evading network anomaly detection systems: formal reasoning and practical techniques. Prahlad Fogla, Wenke Lee |
| 2006 | Formal specification and verification of data separation in a separation kernel for an embedded system. Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean |
| 2006 | Forward-secure signatures with untrusted update. Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
| 2006 | Fourth-factor authentication: somebody you know. John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung |
| 2006 | Hot or not: revealing hidden services by their clock skew. Steven J. Murdoch |
| 2006 | How to win the clonewars: efficient periodic n-times anonymous authentication. Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich |
| 2006 | Inferring the source of encrypted HTTP connections. Marc Liberatore, Brian Neil Levine |
| 2006 | Multi-signatures in the plain public-Key model and a general forking lemma. Mihir Bellare, Gregory Neven |
| 2006 | On the modeling and analysis of obligations. Keith Irwin, Ting Yu, William H. Winsborough |
| 2006 | Optimizing BGP security by exploiting path stability. Kevin R. B. Butler, Patrick D. McDaniel, William Aiello |
| 2006 | Packet vaccine: black-box exploit detection and signature generation. Xiaofeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
| 2006 | Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006 Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati |
| 2006 | Protomatching network traffic for high throughputnetwork intrusion detection. Shai Rubin, Somesh Jha, Barton P. Miller |
| 2006 | Provably-secure time-bound hierarchical key assignment schemes. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
| 2006 | Providing witness anonymity in peer-to-peer systems. Bo Zhu, Sanjeev Setia, Sushil Jajodia |
| 2006 | Puppetnets: misusing web browsers as a distributed attack infrastructure. Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis |
| 2006 | Replayer: automatic protocol replay by binary analysis. James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song |
| 2006 | Resiliency policies in access control. Ninghui Li, Mahesh V. Tripunitara, Qihua Wang |
| 2006 | RoleMiner: mining roles using subset enumeration. Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner |
| 2006 | Safety and consistency in policy-based authorization systems. Adam J. Lee, Marianne Winslett |
| 2006 | Salsa: a structured approach to large-scale anonymity. Arjun Nambiar, Matthew K. Wright |
| 2006 | Searchable symmetric encryption: improved definitions and efficient constructions. Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky |
| 2006 | Secure attribute-based systems. Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters |
| 2006 | Secure function evaluation with ordered binary decision diagrams. Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh |
| 2006 | Secure hierarchical in-network aggregation in sensor networks. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song |
| 2006 | Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
| 2006 | System and network trustworthiness in perspective. Peter G. Neumann |
| 2006 | TinySeRSync: secure and resilient time synchronization in wireless sensor networks. Kun Sun, Peng Ning, Cliff Wang |