CCS A*

40 papers

YearTitle / Authors
2006A fully collusion resistant broadcast, trace, and revoke system.
Dan Boneh, Brent Waters
2006A natural language approach to automated cryptanalysis of two-time pads.
Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield
2006A scalable approach to attack graph generation.
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
2006An effective defense against email spam laundering.
Mengjun Xie, Heng Yin, Haining Wang
2006Attribute-based encryption for fine-grained access control of encrypted data.
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
2006Beyond separation of duty: an algebra for specifying high-level security policies.
Ninghui Li, Qihua Wang
2006Computationally sound secrecy proofs by mechanized flow analysis.
Michael Backes, Peeter Laud
2006Data collection with self-enforcing privacy.
Philippe Golle, Frank McSherry, Ilya Mironov
2006Deniable authentication and key exchange.
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
2006Dictionary attacks using keyboard acoustic emanations.
Yigael Berger, Avishai Wool, Arie Yeredor
2006Doppelganger: Better browser privacy without the bother.
Umesh Shankar, Chris Karlof
2006EXE: automatically generating inputs of death.
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler
2006Evading network anomaly detection systems: formal reasoning and practical techniques.
Prahlad Fogla, Wenke Lee
2006Formal specification and verification of data separation in a separation kernel for an embedded system.
Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean
2006Forward-secure signatures with untrusted update.
Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
2006Fourth-factor authentication: somebody you know.
John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
2006Hot or not: revealing hidden services by their clock skew.
Steven J. Murdoch
2006How to win the clonewars: efficient periodic n-times anonymous authentication.
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
2006Inferring the source of encrypted HTTP connections.
Marc Liberatore, Brian Neil Levine
2006Multi-signatures in the plain public-Key model and a general forking lemma.
Mihir Bellare, Gregory Neven
2006On the modeling and analysis of obligations.
Keith Irwin, Ting Yu, William H. Winsborough
2006Optimizing BGP security by exploiting path stability.
Kevin R. B. Butler, Patrick D. McDaniel, William Aiello
2006Packet vaccine: black-box exploit detection and signature generation.
Xiaofeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
2006Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006
Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati
2006Protomatching network traffic for high throughputnetwork intrusion detection.
Shai Rubin, Somesh Jha, Barton P. Miller
2006Provably-secure time-bound hierarchical key assignment schemes.
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006Providing witness anonymity in peer-to-peer systems.
Bo Zhu, Sanjeev Setia, Sushil Jajodia
2006Puppetnets: misusing web browsers as a distributed attack infrastructure.
Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis
2006Replayer: automatic protocol replay by binary analysis.
James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song
2006Resiliency policies in access control.
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
2006RoleMiner: mining roles using subset enumeration.
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner
2006Safety and consistency in policy-based authorization systems.
Adam J. Lee, Marianne Winslett
2006Salsa: a structured approach to large-scale anonymity.
Arjun Nambiar, Matthew K. Wright
2006Searchable symmetric encryption: improved definitions and efficient constructions.
Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky
2006Secure attribute-based systems.
Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters
2006Secure function evaluation with ordered binary decision diagrams.
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
2006Secure hierarchical in-network aggregation in sensor networks.
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
2006Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation.
Mihir Bellare, Tadayoshi Kohno, Victor Shoup
2006System and network trustworthiness in perspective.
Peter G. Neumann
2006TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Kun Sun, Peng Ning, Cliff Wang