


default search action
13th CCS 2006: Alexandria, VA, USA
- Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati:

Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006. ACM 2006 - Peter G. Neumann:

System and network trustworthiness in perspective. 1-5
Anonymity
- Bo Zhu, Sanjeev Setia, Sushil Jajodia:

Providing witness anonymity in peer-to-peer systems. 6-16 - Arjun Nambiar, Matthew K. Wright

:
Salsa: a structured approach to large-scale anonymity. 17-26 - Steven J. Murdoch

:
Hot or not: revealing hidden services by their clock skew. 27-36
Intrusion detection
- XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi:

Packet vaccine: black-box exploit detection and signature generation. 37-46 - Shai Rubin, Somesh Jha, Barton P. Miller:

Protomatching network traffic for high throughputnetwork intrusion detection. 47-58 - Prahlad Fogla, Wenke Lee:

Evading network anomaly detection systems: formal reasoning and practical techniques. 59-68
Data protection
- Philippe Golle, Frank McSherry, Ilya Mironov

:
Data collection with self-enforcing privacy. 69-78 - Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky

:
Searchable symmetric encryption: improved definitions and efficient constructions. 79-88 - Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:

Attribute-based encryption for fine-grained access control of encrypted data. 89-98 - Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:

Secure attribute-based systems. 99-112
Access control
- Ninghui Li, Mahesh V. Tripunitara, Qihua Wang:

Resiliency policies in access control. 113-123 - Adam J. Lee

, Marianne Winslett:
Safety and consistency in policy-based authorization systems. 124-133 - Keith Irwin, Ting Yu, William H. Winsborough:

On the modeling and analysis of obligations. 134-143 - Jaideep Vaidya, Vijayalakshmi Atluri

, Janice Warner:
RoleMiner: mining roles using subset enumeration. 144-153
Privacy and authentication
- Umesh Shankar, Chris Karlof:

Doppelganger: Better browser privacy without the bother. 154-167 - John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung:

Fourth-factor authentication: somebody you know. 168-178 - Mengjun Xie

, Heng Yin
, Haining Wang:
An effective defense against email spam laundering. 179-190
Applied cryptography I
- Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:

Forward-secure signatures with untrusted update. 191-200 - Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss

, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication. 201-210 - Dan Boneh, Brent Waters:

A fully collusion resistant broadcast, trace, and revoke system. 211-220
Attacks and cryptanalysis
- Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis:

Puppetnets: misusing web browsers as a distributed attack infrastructure. 221-234 - Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield:

A natural language approach to automated cryptanalysis of two-time pads. 235-244 - Yigael Berger, Avishai Wool

, Arie Yeredor:
Dictionary attacks using keyboard acoustic emanations. 245-254 - Marc Liberatore, Brian Neil Levine:

Inferring the source of encrypted HTTP connections. 255-263
Sensors and networking
- Kun Sun

, Peng Ning, Cliff Wang:
TinySeRSync: secure and resilient time synchronization in wireless sensor networks. 264-277 - Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:

Secure hierarchical in-network aggregation in sensor networks. 278-287 - Giuseppe Ateniese

, Alfredo De Santis
, Anna Lisa Ferrara, Barbara Masucci
:
Provably-secure time-bound hierarchical key assignment schemes. 288-297 - Kevin R. B. Butler

, Patrick D. McDaniel, William Aiello:
Optimizing BGP security by exploiting path stability. 298-310
Software and network exploits
- James Newsome, David Brumley

, Jason Franklin, Dawn Xiaodong Song:
Replayer: automatic protocol replay by binary analysis. 311-321 - Cristian Cadar, Vijay Ganesh

, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: automatically generating inputs of death. 322-335 - Xinming Ou, Wayne F. Boyer, Miles A. McQueen:

A scalable approach to attack graph generation. 336-345
Formal methods
- Constance L. Heitmeyer

, Myla Archer, Elizabeth I. Leonard, John D. McLean:
Formal specification and verification of data separation in a separation kernel for an embedded system. 346-355 - Ninghui Li, Qihua Wang:

Beyond separation of duty: an algebra for specifying high-level security policies. 356-369 - Michael Backes, Peeter Laud

:
Computationally sound secrecy proofs by mechanized flow analysis. 370-379
Applied cryptography II
- Mihir Bellare, Tadayoshi Kohno, Victor Shoup:

Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. 380-389 - Mihir Bellare, Gregory Neven:

Multi-signatures in the plain public-Key model and a general forking lemma. 390-399 - Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:

Deniable authentication and key exchange. 400-409 - Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh:

Secure function evaluation with ordered binary decision diagrams. 410-420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














