| 2006 | A Formal Framework for Confidentiality-Preserving Refinement. Thomas Santen |
| 2006 | A Formal Model of Access Control for Mobile Interactive Devices. Frédéric Besson, Guillaume Dufay, Thomas P. Jensen |
| 2006 | A Linear Logic of Authorization and Knowledge. Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter |
| 2006 | Analysis of Policy Anomalies on Distributed Network Security Setups. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2006 | Applying a Security Requirements Engineering Process. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
| 2006 | Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama |
| 2006 | Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings Dieter Gollmann, Jan Meier, Andrei Sabelfeld |
| 2006 | Conditional Reactive Simulatability. Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters |
| 2006 | Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
| 2006 | Delegation in Role-Based Access Control. Jason Crampton, Hemanth Khambhammettu |
| 2006 | Deriving Secrecy in Key Establishment Protocols. Dusko Pavlovic, Catherine Meadows |
| 2006 | Discretionary Capability Confinement. Philip W. L. Fong |
| 2006 | Enhanced Security Architecture for Music Distribution on Mobile. Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau |
| 2006 | Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. Michael P. Collins, Michael K. Reiter |
| 2006 | From Coupling Relations to Mated Invariants for Checking Information Flow. David A. Naumann |
| 2006 | HBAC: A Model for History-Based Access Control and Its Model Checking. Jing Wang, Yoshiaki Takata, Hiroyuki Seki |
| 2006 | Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. Mudhakar Srivatsa, Ling Liu |
| 2006 | License Transfer in OMA-DRM. Cheun Ngen Chong, Sorin M. Iacob, R. Paul Koster, Javier Montaner, René van Buuren |
| 2006 | Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. Michael Backes, Birgit Pfitzmann, Michael Waidner |
| 2006 | Minimal Threshold Closure. Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu |
| 2006 | Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. Alex Hai Wang, Peng Liu |
| 2006 | Policy-Driven Memory Protection for Reconfigurable Hardware. Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner |
| 2006 | Privacy-Preserving Queries on Encrypted Data. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright |
| 2006 | Private Information Retrieval Using Trusted Hardware. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao |
| 2006 | Prêt à Voter with Re-encryption Mixes. Peter Y. A. Ryan, Steve A. Schneider |
| 2006 | Reducing the Dependence of SPKI/SDSI on PKI. Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
| 2006 | Secure Key-Updating for Lazy Revocation. Michael Backes, Christian Cachin, Alina Oprea |
| 2006 | SessionSafe: Implementing XSS Immune Session Handling. Martin Johns |
| 2006 | Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. Vitaly Shmatikov, Ming-Hsiu Wang |
| 2006 | Timing-Sensitive Information Flow Analysis for Synchronous Systems. Boris Köpf, David A. Basin |
| 2006 | Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
| 2006 | TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan |