| 2006 | A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. Ulrich Huber, Ahmad-Reza Sadeghi |
| 2006 | A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
| 2006 | A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. Ellen Jochemsz, Benne de Weger |
| 2006 | A Security Architecture for Protecting LAN Interactions. André Zúquete, Hugo Marques |
| 2006 | A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. Luciano Bononi, Carlo Tacconi |
| 2006 | An Authentication and Key Exchange Protocol for Secure Credential Services. SeongHan Shin, Kazukuni Kobara, Hideki Imai |
| 2006 | An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). Huifang Yin, Jun Li |
| 2006 | Anomaly Intrusion Detection Based on Clustering a Data Stream. Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee |
| 2006 | Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. Javier Herranz, Fabien Laguillaumie |
| 2006 | Breaking Four Mix-Related Schemes Based on Universal Re-encryption. George Danezis |
| 2006 | Collusion-Free Policy-Based Encryption. Walid Bagga, Refik Molva |
| 2006 | Cryptanalysis of Variants of UOV. Yuh-Hua Hu, Chun-Yen Chou, Lih-Chung Wang, Feipei Lai |
| 2006 | Cryptanalysis of the Bluetooth Yaniv Shaked, Avishai Wool |
| 2006 | Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. Mila Katzarova, Andrew Simpson |
| 2006 | Designing and Verifying Core Protocols for Location Privacy. David von Oheimb, Jorge Cuéllar |
| 2006 | Diverging Keys in Wireless Sensor Networks. Michal Ren, Tanmoy Kanti Das, Jianying Zhou |
| 2006 | Enhancing the Security and Efficiency of 3-D Secure. Mohammed Assora, Ayoub Shirvani |
| 2006 | Extending .NET Security to Unmanaged Code. Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna |
| 2006 | Formal Security Model of Multisignatures. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
| 2006 | Formalising Receipt-Freeness. Hugo L. Jonker, Erik P. de Vink |
| 2006 | Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel |
| 2006 | Low Latency Anonymity with Mix Rings. Matthew Burnside, Angelos D. Keromytis |
| 2006 | Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. José Manuel Torres, Jose M. Sarriegi, Javier Santos, Nicolás Serrano |
| 2006 | Multi-party Concurrent Signatures. Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini |
| 2006 | On the Collision Resistance of RIPEMD-160. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
| 2006 | On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
| 2006 | Preserving TCP Connections Across Host Address Changes. Vassilis Prevelakis, Sotiris Ioannidis |
| 2006 | Protecting Data Privacy Through Hard-to-Reverse Negative Databases. Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest |
| 2006 | Related-Key Rectangle Attack on 42-Round SHACAL-2. Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
| 2006 | Resistance Analysis to Intruders' Evasion of Detecting Intrusion. Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
| 2006 | Rights Protection for Data Cubes. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen |
| 2006 | Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald |
| 2006 | SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna |
| 2006 | Simulation of Internet DDoS Attacks and Defense. Igor V. Kotenko, Alexander Ulanov |
| 2006 | Transparent Image Encryption Using Progressive JPEG. Thomas Stütz, Andreas Uhl |
| 2006 | Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie |
| 2006 | Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. Christophe De Cannière |
| 2006 | Using Multiple Smart Cards for Signing Messages at Malicious Terminals. István Zsolt Berta |
| 2006 | Weak Maurizio Atzori |