- Adrian Leung, Chris J. Mitchell:
A Service Discovery Threat Model for Ad Hoc Networks. SECRYPT 2006: 167-174 - Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:
Least Privilege in Separation Kernels. SECRYPT 2006: 355-362 - Wang Lianhai, Manu Malek:
Digital Contract Signature Scheme Based on Multiple Cryptosystem. SECRYPT 2006: 267-274 - Chuan-Wen Loe, Khoongming Khoo:
Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack. SECRYPT 2006: 135-140 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
On the Design of a Low-Rate DoS Attack Against Iterative Servers. SECRYPT 2006: 149-156 - Manu Malek:
IT Security Forensics: Promises and Shortcomings. SECRYPT 2006 - David A. Marca:
E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce. SECRYPT 2006 - David A. Marca:
Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams. SECRYPT 2006 - Rafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López:
Digital Pseudonym Identity for E-Commerce. SECRYPT 2006: 91-94 - Robert P. McEvoy, Colin C. Murphy:
Efficient All-or-Nothing Encryption Using CTR Mode. SECRYPT 2006: 237-245 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Secure Information Systems Development - Based on a Security Requirements Engineering Process. SECRYPT 2006: 467-470 - Sharon Nachtigal, Chris J. Mitchell:
Modelling E-Business Security Using Business Processes. SECRYPT 2006: 459-464 - Christophe Nègre:
Parallel Multiplication in F2n Using Condensed Matrix Representation. SECRYPT 2006: 254-259 - Christophe Nègre:
Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform. SECRYPT 2006: 320-323 - Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed:
Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption. SECRYPT 2006: 175-182 - Ventzislav Nikov:
A DoS Attack Against the Integrity-Less ESP (IPSEC). SECRYPT 2006: 192-199 - Fernando Pereira:
Multimedia Representation in MPEG Standards: Achievements and Challenges. SECRYPT 2006 - Francisco Pimenta, Carlos Serrão:
Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS. SECRYPT 2006: 311-315 - Wenhua Qi:
Access Control and Joint Management for Collaborative Peer Groups. SECRYPT 2006: 83-86 - Chun Qi, Haitao Zhou, Bin Long:
Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain. SECRYPT 2006: 347-350 - Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006: 207-210 - R. Ricci, Gérard Chollet, M. V. Crispino, Sabah Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez:
The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly. SECRYPT 2006: 9-16 - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Defining Viewpoints for Security Architectural Patterns. SECRYPT 2006: 419-424 - Antonio Ruiz-Martínez, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:
Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet. SECRYPT 2006: 203-206 - Markku-Juhani Olavi Saarinen:
Chosen-IV Statistical Attacks on eStream Ciphers. SECRYPT 2006: 260-266 - Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:
Using Microsoft Office Infopath to Generate XACML Policies. SECRYPT 2006: 379-386 - Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili:
Security Enhancement for a Low Computation Cost User Authentication Scheme. SECRYPT 2006: 5-8 - Carlos Serrão, Miguel Sales Dias, Jaime Delgado:
Digital Object Rights Management - Interoperable Client-side DRM Middleware. SECRYPT 2006: 229-236 - Anisse Taleb:
Advances in Speech and Audio Coding and its Applications for Mobile Multimedia. SECRYPT 2006 - Hiroshi Toyoizumi:
An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication. SECRYPT 2006: 283-288