| 2006 | A Chaos-Based Robust Software Watermarking. Fenlin Liu, Bin Lu, Xiangyang Luo |
| 2006 | A Counting-Based Method for Massive Spam Mail Classification. Hao Luo, Binxing Fang, Xiao-chun Yun |
| 2006 | A Design and Implementation of Profile Based Web Application Securing Proxy. Youngtae Yun, Sangseo Park, Yosik Kim, JaeCheol Ryou |
| 2006 | A Novel Dynamic Immunization Strategy for Computer Network Epidemics. ZhiFei Tao, Hai Jin, Zongfen Han, En Cheng |
| 2006 | A Practical Clumped-Tree Multicast Encryption Scheme. Ling Dong, Kefei Chen |
| 2006 | A Protocol of Member-Join in a Secret Sharing Scheme. Xiao Li, Mingxing He |
| 2006 | Adversarial Organization Modeling for Network Attack/Defense. Ji Wu, Chaoqun Ye, Shiyao Jin |
| 2006 | An Efficient Way to Build Secure Disk. Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai |
| 2006 | An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. Muhammad Khurram Khan, Jiashu Zhang |
| 2006 | An Empirical Study of Quality and Cost Based Security Engineering. Seok Lee, Tai-Myung Chung, Myeonggil Choi |
| 2006 | DPA-Resistant Finite Field Multipliers and Secure AES Design. Yoo-Jin Baek, Mi-Jung Noh |
| 2006 | Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai |
| 2006 | Diophantine Approximation Attack on a Fast Public Key Cryptosystem. Baocang Wang, Yupu Hu |
| 2006 | Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. Gu Su Kim, Young Ik Eom |
| 2006 | Efficient Public Key Broadcast Encryption Using Identifier of Receivers. Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee |
| 2006 | Further Security Analysis of XTR. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim |
| 2006 | Identity Based Key Insulated Signature. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
| 2006 | Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang |
| 2006 | Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou |
| 2006 | Integrating Grid with Cryptographic Computing. Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin |
| 2006 | Linkable Democratic Group Signatures. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
| 2006 | Model and Estimation of Worm Propagation Under Network Partition. Ping Wang, Binxing Fang, Xiao-chun Yun |
| 2006 | More on Shared-Scalar-Product Protocols. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu |
| 2006 | Practical Forensic Analysis in Advanced Access Content System. Hongxia Jin, Jeffery Lotspiech |
| 2006 | Preventing Web-Spoofing with Automatic Detecting Security Indicator. Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu |
| 2006 | Privately Retrieve Data from Large Databases. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang |
| 2006 | Securing C Programs by Dynamic Type Checking. Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun |
| 2006 | Security Analysis of a Server-Aided RSA Key Generation Protocol. Tianjie Cao, Xianping Mao, Dongdai Lin |
| 2006 | Security Protocol Analysis with Improved Authentication Tests. Xiehua Li, Shutang Yang, Jianhua Li, Hongwen Zhu |
| 2006 | Short (Identity-Based) Strong Designated Verifier Signature Schemes. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang |
| 2006 | Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li |
| 2006 | Tackling Worm Detection Speed and False Alarm in Virus Throttling. Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi |
| 2006 | Three-Round Secret Handshakes Based on ElGamal and DSA. Lan Zhou, Willy Susilo, Yi Mu |
| 2006 | Trojan Horse Attack Strategy on Quantum Private Communication. Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng |
| 2006 | Using Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun |
| 2006 | Using Data Field to Analyze Network Intrusions. Feng Xie, Shuo Bai |