ICICS C

40 papers

YearTitle / Authors
2006A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.
Jiangtao Li, Ninghui Li
2006A Fast RSA Implementation on Itanium 2 Processor.
Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
2006A Robust and Secure RFID-Based Pedigree System (Short Paper).
Chiu C. Tan, Qun Li
2006A Security Analysis of the Precise Time Protocol (Short Paper).
Jeanette Tsang, Konstantin Beznosov
2006A Topological Condition for Solving Fair Exchange in Byzantine Environments.
Benoît Garbinato, Ian Rickebusch
2006A Wireless Covert Channel on Smart Cards (Short Paper).
Geir Olav Dyrkolbotn, Einar Snekkenes
2006An Anonymous Authentication Scheme for Identification Card.
He Ge
2006An Attack on SMC-Based Software Protection.
Yongdong Wu, Zhigang Zhao, Tian Wei Chui
2006An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper).
Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan
2006An Identity-Based Proxy Signature Scheme from Pairings.
Kyung-Ah Shim
2006An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper).
Errin W. Fulp
2006An Operating System Design for the Security Architecture for Microprocessors.
Jörg Platte, Raúl Durán Díaz, Edwin Naroska
2006Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper).
Kyung-Ah Shim, Seung-Hyun Seo
2006Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.
Guilin Wang, Feng Bao
2006Defining and Measuring Policy Coverage in Testing Access Control Policies.
Evan Martin, Tao Xie, Ting Yu
2006Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
Ziqing Mao, Ninghui Li, William H. Winsborough
2006Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper).
Haodong Wang, Qun Li
2006Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.
Yves Younan, Wouter Joosen, Frank Piessens
2006Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets.
Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong
2006Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario.
Oleksiy Mazhelis, Seppo Puuronen, Mika Raento
2006Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper).
Huafei Zhu, Jianying Zhou
2006Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
2006From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution.
Himanshu Khurana, Jin Heo, Meenal Pant
2006Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper).
Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan
2006Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.
Tatsuyuki Matsushita, Hideki Imai
2006Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Peng Ning, Sihan Qing, Ninghui Li
2006Left-to-Right Signed-Bit
Billy Bob Brumley
2006Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro
2006Modular Behavior Profiles in Systems with Shared Libraries (Short Paper).
Carla Marceau, Matthew Stillerman
2006Point-Based Trust: Define How Much Privacy Is Worth.
Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
2006Provably Correct Runtime Enforcement of Non-interference Properties.
V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar
2006Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper).
Karsten Nohl, David Evans
2006Secure Set Membership Using 3Sat.
Michael de Mare, Rebecca N. Wright
2006Seifert's RSA Fault Attack: Simplified Analysis and Generalizations.
James A. Muir
2006Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.
Chae Hoon Lim, Taekyoung Kwon
2006The Fairness of Perfect Concurrent Signatures.
Guilin Wang, Feng Bao, Jianying Zhou
2006Threshold Implementations Against Side-Channel Attacks and Glitches.
Svetla Nikova, Christian Rechberger, Vincent Rijmen
2006Trace-Driven Cache Attacks on AES (Short Paper).
Onur Aciiçmez, Çetin Kaya Koç
2006Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper).
Richard J. Edell, Peter Kruus, Uri Meth
2006Universal Designated Verifier Signature Without Delegatability.
Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu