1. ASIACCS 2006:
Taipei,
Taiwan
Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia (Eds.):
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006.
ACM 2006, ISBN 1-59593-272-0
Invited Talks
Security protocols
Database security
Intrusion detection and modeling
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach.
90-101
- Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier:
Time series modeling for IDS alert management.
102-113
- Ashish Gehani, Surendar Chandra, Gershon Kedem:
Augmenting storage with an intrusion response primitive to ensure the security of critical data.
114-124
- David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song:
Design space and analysis of worm defense strategies.
125-137
P2P & ad hoc networks
Digital rights management and watermarking
Software security
Access control and authorization
Authentication and biometrics
Cryptosystem and analysis
Wireless sensor networks
Secure routing and firewall
Fast abstract session:
multimedia security
Fast abstract session:
network security
- Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu:
A general design towards secure ad-hoc collaboration.
358
- Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography.
359
- Jiun-Tze Lai, Ting-Wei Hou:
An efficient secure communication between set-top box and smart card in DTV broadcasting.
360
- Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh:
Forgery attack on the RPC incremental unforgeable encryption scheme.
361
- Y. L. Huang, F. S. Ho, H. Y. Tsai, H. M. Kao:
A control flow obfuscation method to discourage malicious tampering of software codes.
362
- Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro:
Problems on the MR micropayment schemes.
363
- Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann:
Design and implementation of a reconfigurable hardware for secure embedded systems.
364
Fast abstract session:
digital signature
- Mark Manulis:
Democratic group signatures: on an example of joint ventures.
365
- Lin-Chuan Wu:
Analysis of traceability attack on Camenisch et al.'s blind signature schemes.
366
- Toshihiko Matsuo:
Restricted message signing.
367
Fast abstract session:
cryptosystem
Copyright © Sun Mar 14 22:57:23 2010
by Michael Ley (ley@uni-trier.de)