MOTIVATION AND MODELING ISSUES -- Databases: The Integrative Force in Cyberspace -- Federating Location-Based Data Services -- An Agent-Based Approach to Correctness in Databases -- INFRASTRUCTURAL SERVICES -- Thirty Years of Server Technology — From Transaction Processing to Web Services -- Caching over the Entire User-to-Data Path in the Internet -- Reweaving the Tapestry: Integrating Datab…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Keynote Lectures -- How Much Intelligence in the Semantic Web? -- The Wisdom Web – A Grand Intellectual Undertaking -- Measuring Attractiveness of Rules from the Viewpoint of Knowledge Representation, Prediction and Efficiency of Intervention -- Web Intelligence Meets Brain Informatics: An Impending Revolution in WI and Brain Sciences -- Case Studies -- Hybrid Computational Intelligence for A…
Scalable, Self-Organizing Technology for Sensor Networks -- On the Fundamental Relationship Between the Achievable Capacity and Delay in Mobile Wireless Networks -- Self-Optimization in Sensor Networks -- From Internets to Bionets: Biological Kinetic Service Oriented Networks -- Cooperative Routing in Wireless Networks -- In-Network Decision Making Via Local Message-Passing -- Maximizing Aggreg…
Session I: March 18, 2004, Heraklion, Crete, Greece -- Querying Sliding Windows Over Online Data Streams -- MIRA: Multilingual Information Processing on Relational Architecture -- Index-Based Keyword Search in Mediator Systems -- Concept-Based Search on Semi-structured Data Exploiting Mined Semantic Relations -- Distributed and Scalable Similarity Searching in Metric Spaces -- Pattern Based Man…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…
Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploitin…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
A Case Study of Web Services Orchestration -- A Correct Abstract Machine for Safe Ambients -- A Process Calculus for QoS-Aware Applications -- Abstract Interpretation-Based Verification of Non-functional Requirements -- Coordination Systems in Role-Based Adaptive Software -- Coordination with Multicapabilities -- Delegation Modeling with Paradigm -- Dynamically Adapting Tuple Replication for Ma…
Building a CSCW Infrastructure Utilizing an M&S Architecture and XML -- Modelization of a Communication Protocol for CSCW Systems Using Coloured Petri Nets -- The Design of a Workflow-Centric, Context-Aware Framework to Support Heterogeneous Computing Environments in Collaboration -- Do Tangible User Interfaces Impact Spatial Cognition in Collaborative Design? -- Cooperation in Highly Distribut…