default search action
13th CCS 2006: Alexandria, VA, USA
- Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati:
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006. ACM 2006 - Peter G. Neumann:
System and network trustworthiness in perspective. 1-5
Anonymity
- Bo Zhu, Sanjeev Setia, Sushil Jajodia:
Providing witness anonymity in peer-to-peer systems. 6-16 - Arjun Nambiar, Matthew K. Wright:
Salsa: a structured approach to large-scale anonymity. 17-26 - Steven J. Murdoch:
Hot or not: revealing hidden services by their clock skew. 27-36
Intrusion detection
- XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation. 37-46 - Shai Rubin, Somesh Jha, Barton P. Miller:
Protomatching network traffic for high throughputnetwork intrusion detection. 47-58 - Prahlad Fogla, Wenke Lee:
Evading network anomaly detection systems: formal reasoning and practical techniques. 59-68
Data protection
- Philippe Golle, Frank McSherry, Ilya Mironov:
Data collection with self-enforcing privacy. 69-78 - Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: improved definitions and efficient constructions. 79-88 - Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-based encryption for fine-grained access control of encrypted data. 89-98 - Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. 99-112
Access control
- Ninghui Li, Mahesh V. Tripunitara, Qihua Wang:
Resiliency policies in access control. 113-123 - Adam J. Lee, Marianne Winslett:
Safety and consistency in policy-based authorization systems. 124-133 - Keith Irwin, Ting Yu, William H. Winsborough:
On the modeling and analysis of obligations. 134-143 - Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner:
RoleMiner: mining roles using subset enumeration. 144-153
Privacy and authentication
- Umesh Shankar, Chris Karlof:
Doppelganger: Better browser privacy without the bother. 154-167 - John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung:
Fourth-factor authentication: somebody you know. 168-178 - Mengjun Xie, Heng Yin, Haining Wang:
An effective defense against email spam laundering. 179-190
Applied cryptography I
- Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-secure signatures with untrusted update. 191-200 - Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication. 201-210 - Dan Boneh, Brent Waters:
A fully collusion resistant broadcast, trace, and revoke system. 211-220
Attacks and cryptanalysis
- Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis:
Puppetnets: misusing web browsers as a distributed attack infrastructure. 221-234 - Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield:
A natural language approach to automated cryptanalysis of two-time pads. 235-244 - Yigael Berger, Avishai Wool, Arie Yeredor:
Dictionary attacks using keyboard acoustic emanations. 245-254 - Marc Liberatore, Brian Neil Levine:
Inferring the source of encrypted HTTP connections. 255-263
Sensors and networking
- Kun Sun, Peng Ning, Cliff Wang:
TinySeRSync: secure and resilient time synchronization in wireless sensor networks. 264-277 - Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
Secure hierarchical in-network aggregation in sensor networks. 278-287 - Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes. 288-297 - Kevin R. B. Butler, Patrick D. McDaniel, William Aiello:
Optimizing BGP security by exploiting path stability. 298-310
Software and network exploits
- James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song:
Replayer: automatic protocol replay by binary analysis. 311-321 - Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: automatically generating inputs of death. 322-335 - Xinming Ou, Wayne F. Boyer, Miles A. McQueen:
A scalable approach to attack graph generation. 336-345
Formal methods
- Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean:
Formal specification and verification of data separation in a separation kernel for an embedded system. 346-355 - Ninghui Li, Qihua Wang:
Beyond separation of duty: an algebra for specifying high-level security policies. 356-369 - Michael Backes, Peeter Laud:
Computationally sound secrecy proofs by mechanized flow analysis. 370-379
Applied cryptography II
- Mihir Bellare, Tadayoshi Kohno, Victor Shoup:
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. 380-389 - Mihir Bellare, Gregory Neven:
Multi-signatures in the plain public-Key model and a general forking lemma. 390-399 - Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable authentication and key exchange. 400-409 - Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh:
Secure function evaluation with ordered binary decision diagrams. 410-420
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.