| 2006 | A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. Gregory V. Bard |
| 2006 | A DoS Attack Against the Integrity-Less ESP (IPSEC). Ventzislav Nikov |
| 2006 | A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra. Seyed Hamed Hassani, Mohammad Reza Aref |
| 2006 | A Service Discovery Threat Model for Ad Hoc Networks. Adrian Leung, Chris J. Mitchell |
| 2006 | Access Control and Joint Management for Collaborative Peer Groups. Wenhua Qi |
| 2006 | Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
| 2006 | Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption. Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed |
| 2006 | Advances in Speech and Audio Coding and its Applications for Mobile Multimedia. Anisse Taleb |
| 2006 | An Algorithm for Authentication of Digital Images. Dumitru Dan Burdescu, Liana Stanescu |
| 2006 | An Extended Role-Based Access Control for Web Services. Yi-qun Zhu, Jianhua Li, Quan-hai Zhang |
| 2006 | An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication. Hiroshi Toyoizumi |
| 2006 | Chosen-IV Statistical Attacks on eStream Ciphers. Markku-Juhani Olavi Saarinen |
| 2006 | Collaboration Security for Modern Information Systems. Richard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege |
| 2006 | Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet. Antonio Ruiz-Martínez, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte |
| 2006 | Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection. Najla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed |
| 2006 | Defining Viewpoints for Security Architectural Patterns. David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Design and Implementation of a Practical Secure Distributed Healthcare Application. Zaobin Gan, Vijay Varadharajan |
| 2006 | Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez |
| 2006 | Digital Contract Signature Scheme Based on Multiple Cryptosystem. Wang Lianhai, Manu Malek |
| 2006 | Digital Object Rights Management - Interoperable Client-side DRM Middleware. Carlos Serrão, Miguel Sales Dias, Jaime Delgado |
| 2006 | Digital Pseudonym Identity for E-Commerce. Rafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López |
| 2006 | E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce. David A. Marca |
| 2006 | Efficient All-or-Nothing Encryption Using CTR Mode. Robert P. McEvoy, Colin C. Murphy |
| 2006 | Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center. Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies |
| 2006 | Extending XML Signature and Applying it to Web Page Signing. Takahito Tsukuba, Kenichiro Noguchi |
| 2006 | Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform. Christophe Nègre |
| 2006 | Flexible License Transfer System Using Mobile Terminal. Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura |
| 2006 | Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka |
| 2006 | IT Security Forensics: Promises and Shortcomings. Manu Malek |
| 2006 | Improving Software Security Through an Integrated Approach. Zaobin Gan, Dengwei Wei, Vijay Varadharajan |
| 2006 | Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels. Zheng Zhang, Walid Rjaibi |
| 2006 | Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements. Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni |
| 2006 | Intrusion Detection for Web Applications (Short Version). Nathalie Dagorn |
| 2006 | JASTEG2000 - Steganography for JPEG2000 Coded Images. Domenico Introna, Francescomaria Marino |
| 2006 | Layered Architecture for Secure E-Commerce Applications. Amir Herzberg, Igal Yoffe |
| 2006 | Least Privilege in Separation Kernels. Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen |
| 2006 | Model-Based Security Engineering. Jan Jürjens |
| 2006 | Modelling E-Business Security Using Business Processes. Sharon Nachtigal, Chris J. Mitchell |
| 2006 | More Robust Private Information. Chun-Hua Chen, Gwoboa Horng |
| 2006 | Multimedia Representation in MPEG Standards: Achievements and Challenges. Fernando Pereira |
| 2006 | Network Security Evaluation Based on Simulation of Malfactor's Behavior. Igor V. Kotenko, Mikhail Stepashkin |
| 2006 | On Use of Identity-Based Encryption for Secure Emailing. Christian Veigner, Chunming Rong |
| 2006 | On the Design of a Low-Rate DoS Attack Against Iterative Servers. Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
| 2006 | On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data. Kun Huang, Dafang Zhang |
| 2006 | Parallel Multiplication in F2n Using Condensed Matrix Representation. Christophe Nègre |
| 2006 | Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters. Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque |
| 2006 | Private Bidding for Mobile Agents. Bartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe |
| 2006 | Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams. David A. Marca |
| 2006 | Proposals for Iterated Hash Functions. Lars R. Knudsen, Søren S. Thomsen |
| 2006 | Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach. Ahmed Réda Kaced, Jean-Claude Moissinac |
| 2006 | Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. Chuan-Wen Loe, Khoongming Khoo |
| 2006 | Protocol Independent Lightweight Secure Communication. M. Amaç Güvensan, Ali Gökhan Yavuz |
| 2006 | Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based. Chunren Lai, Chang N. Zhang |
| 2006 | Redefining the Market Place: Only the Numbers are Different? Thomas Greene |
| 2006 | SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Manu Malek, Eduardo Fernández-Medina, Javier Hernando |
| 2006 | Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. Pascal Urien, Mohamad Badra |
| 2006 | Secure Information Systems Development - Based on a Security Requirements Engineering Process. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Secure Online English Auctions. Jarrod Trevathan, Wayne Read |
| 2006 | Securing Web Services Using Identity-Based Encryption (IBE). Kari Anne Haaland, Chunming Rong |
| 2006 | Security Considerations in Current VoIP Protocols. Steffen Fries |
| 2006 | Security Enhancement for a Low Computation Cost User Authentication Scheme. Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili |
| 2006 | Security Risk Analysis in Web Services Systems. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini |
| 2006 | Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain. Chun Qi, Haitao Zhou, Bin Long |
| 2006 | Spoofed ARP Packets Detection in Switched LAN Networks. Zouheir Trabelsi, Khaled Shuaib |
| 2006 | The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. R. Ricci, Gérard Chollet, M. V. Crispino, Sabah Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez |
| 2006 | Traitor Tracing for Subscription-Based Systems. Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum |
| 2006 | Trust Management without Reputation in P2P Games. Adam Wierzbicki |
| 2006 | Undesirable and Fraudulent Behaviour in Online Auctions. Jarrod Trevathan, Wayne Read |
| 2006 | Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani |
| 2006 | Using Microsoft Office Infopath to Generate XACML Policies. Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte |
| 2006 | Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS. Francisco Pimenta, Carlos Serrão |
| 2006 | Wireless Communications, a new Emphasis for Effective Use of the Radio Spectrum. Les Barclay |
| 2006 | Workload Hidden Markov Model for Anomaly Detection. Juan Manuel García, Tomás Navarrete, Carlos Orozco |