| 2006 | A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. Jiangtao Li, Ninghui Li |
| 2006 | A Fast RSA Implementation on Itanium 2 Processor. Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh |
| 2006 | A Robust and Secure RFID-Based Pedigree System (Short Paper). Chiu C. Tan, Qun Li |
| 2006 | A Security Analysis of the Precise Time Protocol (Short Paper). Jeanette Tsang, Konstantin Beznosov |
| 2006 | A Topological Condition for Solving Fair Exchange in Byzantine Environments. Benoît Garbinato, Ian Rickebusch |
| 2006 | A Wireless Covert Channel on Smart Cards (Short Paper). Geir Olav Dyrkolbotn, Einar Snekkenes |
| 2006 | An Anonymous Authentication Scheme for Identification Card. He Ge |
| 2006 | An Attack on SMC-Based Software Protection. Yongdong Wu, Zhigang Zhao, Tian Wei Chui |
| 2006 | An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan |
| 2006 | An Identity-Based Proxy Signature Scheme from Pairings. Kyung-Ah Shim |
| 2006 | An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). Errin W. Fulp |
| 2006 | An Operating System Design for the Security Architecture for Microprocessors. Jörg Platte, Raúl Durán Díaz, Edwin Naroska |
| 2006 | Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). Kyung-Ah Shim, Seung-Hyun Seo |
| 2006 | Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. Guilin Wang, Feng Bao |
| 2006 | Defining and Measuring Policy Coverage in Testing Access Control Policies. Evan Martin, Tao Xie, Ting Yu |
| 2006 | Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). Ziqing Mao, Ninghui Li, William H. Winsborough |
| 2006 | Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). Haodong Wang, Qun Li |
| 2006 | Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. Yves Younan, Wouter Joosen, Frank Piessens |
| 2006 | Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong |
| 2006 | Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario. Oleksiy Mazhelis, Seppo Puuronen, Mika Raento |
| 2006 | Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). Huafei Zhu, Jianying Zhou |
| 2006 | Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng |
| 2006 | From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. Himanshu Khurana, Jin Heo, Meenal Pant |
| 2006 | Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan |
| 2006 | Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. Tatsuyuki Matsushita, Hideki Imai |
| 2006 | Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Peng Ning, Sihan Qing, Ninghui Li |
| 2006 | Left-to-Right Signed-Bit Billy Bob Brumley |
| 2006 | Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
| 2006 | Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). Carla Marceau, Matthew Stillerman |
| 2006 | Point-Based Trust: Define How Much Privacy Is Worth. Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
| 2006 | Provably Correct Runtime Enforcement of Non-interference Properties. V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar |
| 2006 | Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). Karsten Nohl, David Evans |
| 2006 | Secure Set Membership Using 3Sat. Michael de Mare, Rebecca N. Wright |
| 2006 | Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. James A. Muir |
| 2006 | Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. Chae Hoon Lim, Taekyoung Kwon |
| 2006 | The Fairness of Perfect Concurrent Signatures. Guilin Wang, Feng Bao, Jianying Zhou |
| 2006 | Threshold Implementations Against Side-Channel Attacks and Glitches. Svetla Nikova, Christian Rechberger, Vincent Rijmen |
| 2006 | Trace-Driven Cache Attacks on AES (Short Paper). Onur Aciiçmez, Çetin Kaya Koç |
| 2006 | Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). Richard J. Edell, Peter Kruus, Uri Meth |
| 2006 | Universal Designated Verifier Signature Without Delegatability. Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu |