ISC C

39 papers

YearTitle / Authors
2006A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Ulrich Huber, Ahmad-Reza Sadeghi
2006A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
2006A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice.
Ellen Jochemsz, Benne de Weger
2006A Security Architecture for Protecting LAN Interactions.
André Zúquete, Hugo Marques
2006A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks.
Luciano Bononi, Carlo Tacconi
2006An Authentication and Key Exchange Protocol for Secure Credential Services.
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2006An Efficient Probabilistic Packet Marking Scheme (NOD-PPM).
Huifang Yin, Jun Li
2006Anomaly Intrusion Detection Based on Clustering a Data Stream.
Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee
2006Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption.
Javier Herranz, Fabien Laguillaumie
2006Breaking Four Mix-Related Schemes Based on Universal Re-encryption.
George Danezis
2006Collusion-Free Policy-Based Encryption.
Walid Bagga, Refik Molva
2006Cryptanalysis of Variants of UOV.
Yuh-Hua Hu, Chun-Yen Chou, Lih-Chung Wang, Feipei Lai
2006Cryptanalysis of the Bluetooth
Yaniv Shaked, Avishai Wool
2006Delegation in a Distributed Healthcare Context: A Survey of Current Approaches.
Mila Katzarova, Andrew Simpson
2006Designing and Verifying Core Protocols for Location Privacy.
David von Oheimb, Jorge Cuéllar
2006Diverging Keys in Wireless Sensor Networks.
Michal Ren, Tanmoy Kanti Das, Jianying Zhou
2006Enhancing the Security and Efficiency of 3-D Secure.
Mohammed Assora, Ayoub Shirvani
2006Extending .NET Security to Unmanaged Code.
Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
2006Formal Security Model of Multisignatures.
Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
2006Formalising Receipt-Freeness.
Hugo L. Jonker, Erik P. de Vink
2006Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel
2006Low Latency Anonymity with Mix Rings.
Matthew Burnside, Angelos D. Keromytis
2006Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.
José Manuel Torres, Jose M. Sarriegi, Javier Santos, Nicolás Serrano
2006Multi-party Concurrent Signatures.
Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
2006On the Collision Resistance of RIPEMD-160.
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2006On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2006Preserving TCP Connections Across Host Address Changes.
Vassilis Prevelakis, Sotiris Ioannidis
2006Protecting Data Privacy Through Hard-to-Reverse Negative Databases.
Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest
2006Related-Key Rectangle Attack on 42-Round SHACAL-2.
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
2006Resistance Analysis to Intruders' Evasion of Detecting Intrusion.
Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang
2006Rights Protection for Data Cubes.
Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
2006Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.
Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
2006SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
2006Simulation of Internet DDoS Attacks and Defense.
Igor V. Kotenko, Alexander Ulanov
2006Transparent Image Encryption Using Progressive JPEG.
Thomas Stütz, Andreas Uhl
2006Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie
2006Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles.
Christophe De Cannière
2006Using Multiple Smart Cards for Signing Messages at Malicious Terminals.
István Zsolt Berta
2006Weak
Maurizio Atzori