13. CCS 2006:
Alexandria,
VA,
USA
Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati (Eds.):
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006.
ACM 2006 BibTeX
Anonymity
Intrusion detection
Data protection
- Philippe Golle, Frank McSherry, Ilya Mironov:
Data collection with self-enforcing privacy.
69-78
Electronic Edition (ACM DL) BibTeX
- Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: improved definitions and efficient constructions.
79-88
Electronic Edition (ACM DL) BibTeX
- Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-based encryption for fine-grained access control of encrypted data.
89-98
Electronic Edition (ACM DL) BibTeX
- Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters:
Secure attribute-based systems.
99-112
Electronic Edition (ACM DL) BibTeX
Access control
Privacy and authentication
Applied cryptography I
- Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-secure signatures with untrusted update.
191-200
Electronic Edition (ACM DL) BibTeX
- Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication.
201-210
Electronic Edition (ACM DL) BibTeX
- Dan Boneh, Brent Waters:
A fully collusion resistant broadcast, trace, and revoke system.
211-220
Electronic Edition (ACM DL) BibTeX
Attacks and cryptanalysis
Sensors and networking
Software and network exploits
Formal methods
Applied cryptography II
Copyright © Sat May 16 23:00:56 2009
by Michael Ley (ley@uni-trier.de)