| 2006 | A Customizable Reputation-based Privacy Assurance System using Active Feedback. Stephen Crane, Marco Casassa Mont |
| 2006 | A Distributed Stealthy Coordination Mechanism for Worm Synchronization. Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig |
| 2006 | A Double Horizon Defense Design for Robust Regulation of Malicious Traffic. Ying Xu, Roch Guérin |
| 2006 | A Flexible Approach to Intrusion Alert Anonymization and Correlation. Dingbang Xu, Peng Ning |
| 2006 | A Framework for Identifying Compromised Nodes in Sensor Networks. Qing Zhang, Ting Yu, Peng Ning |
| 2006 | A History-Based Framework to Build Trust Management Systems. Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda |
| 2006 | A Unified Framework for Trust Management. Weiliang Zhao, Vijay Varadharajan, George Bryan |
| 2006 | An Architecture for an Email Worm Prevention System. Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba |
| 2006 | An Identity-based Ring Signature Scheme with Enhanced Privacy. Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum |
| 2006 | An Infrastructure for Gaining Trust in Context Information. Frank Fransen, Sven Lachmund, Eddy Olk, Laurent Bussard |
| 2006 | An Intelligent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection Systems. Emmanuel Hooper |
| 2006 | Computing with Trust: Definition, Properties, and Algorithms. Jennifer Golbeck |
| 2006 | DaTA - Data-Transparent Authentication Without Communication Overhead. Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia |
| 2006 | Denial of Service Attacks and Defenses in Decentralized Trust Management. Jiangtao Li, Ninghui Li, Xiaofeng Wang, Ting Yu |
| 2006 | Detecting the Sybil Attack in Mobile Ad hoc Networks. Chris Piro, Clay Shields, Brian Neil Levine |
| 2006 | Discount Anonymous On Demand Routing for Mobile Ad hoc Networks. Liu Yang, Markus Jakobsson, Susanne Wetzel |
| 2006 | Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Katharine Chang, Kang G. Shin |
| 2006 | Effective Detection of Active Worms with Varying Scan Rate. Wei Yu, Xun Wang, Dong Xuan, David Lee |
| 2006 | Efficient visualization of change events in enterprise networks. Andrew Stewart |
| 2006 | Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures. Costin Raiciu, David S. Rosenblum |
| 2006 | Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks. George Theodorakopoulos, John S. Baras |
| 2006 | Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems. Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady |
| 2006 | Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. Radmilo Racic, Denys Ma, Hao Chen |
| 2006 | Flow Anomaly Detection in Firewalled Networks. Michael J. Chapple, Timothy E. Wright, Robert M. Winding |
| 2006 | Implementation and Performance Evaluation of EAP-TLS-KS. Jared Cordasco, Ulrike Meyer, Susanne Wetzel |
| 2006 | In-Band Wormholes and Countermeasures in OLSR Networks. Peter Kruus, Daniel Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie Ivanic, Geoffrey Lawler |
| 2006 | Leveraging IPsec for Mandatory Per-Packet Access Control. Trent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang |
| 2006 | MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks. Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff |
| 2006 | Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. Liang Xie, Sencun Zhu |
| 2006 | Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch |
| 2006 | Non-Invasive Methods for Host Certification. Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel |
| 2006 | On Filtering of DDoS Attacks Based on Source Address Prefixes. Gary Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan |
| 2006 | On Mobile Viruses Exploiting Messaging and Bluetooth Services. Abhijit Bose, Kang G. Shin |
| 2006 | Outsourcing Security Analysis with Anonymized Logs. Jianqing Zhang, Nikita Borisov, William Yurcik |
| 2006 | Packet Coding for Strong Anonymity in Ad Hoc Networks. Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux |
| 2006 | Passive Wireless Host Detection Using Local RTT Timing Characteristics on an Enterprise Network. Chad D. Mano, David A. Cieslak |
| 2006 | Preventing Cross Site Request Forgery Attacks. Nenad Jovanovic, Engin Kirda, Christopher Kruegel |
| 2006 | Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering. Jonathan T. Trostle |
| 2006 | Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. Mike Burmester, Tri Van Le, Breno de Medeiros |
| 2006 | Providing Tunable Security Services: An IEEE 802.11i Example. Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth |
| 2006 | Reputation-Based Algorithm for Managing Trust in File Sharing Networks. Lara Srour, Ayman I. Kayssi, Ali Chehab |
| 2006 | Reputation-based Trust-Aware Recommender System. Sukumal Kitisin, Clifford Neuman |
| 2006 | S-DV: A new approach to Secure Distance Vector routing protocols. Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout |
| 2006 | Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006 |
| 2006 | Secure Real-time User Preference Collection for Broadcast Scheduling. Xuhua Ding, Shuhong Wang, Baihua Zheng |
| 2006 | Sensor Networks that Are Provably Resilient. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
| 2006 | System Anomaly Detection: Mining Firewall Logs. Robert M. Winding, Timothy E. Wright, Michael J. Chapple |
| 2006 | TOPO: A Topology-aware Single Packet Attack Traceback Scheme. Linfeng Zhang, Yong Guan |
| 2006 | Towards Communal Governed Transactions Among Decentralized Trading Agents. Avinanta Tarigan |
| 2006 | Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships. Stephan Groß |
| 2006 | Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. Catherine Meadows, Paul F. Syverson, Liwu Chang |
| 2006 | Wavelet-based Real Time Detection of Network Traffic Anomalies. Chin-Tser Huang, Sachin Thareja, Yong-June Shin |
| 2006 | Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices. Sule Simsek |
| 2006 | Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic. Nicholas Weaver, Vern Paxson, Robin Sommer |
| 2006 | Work in Progress: Streamlined IT Risk Management through a Micro Risk Management System (μRMS). Timothy E. Wright, Michael J. Chapple, Robert M. Winding |
| 2006 | Work in Progress: Who is Watching You? Video Conferencing Security. Navid Jam, Elliot Proebstel |