Invited Lectures -- Page Migration in Dynamic Networks -- Knot Theory, Jones Polynomial and Quantum Computing -- Interactive Algorithms 2005 -- Some Computational Issues in Membrane Computing -- The Generalization of Dirac’s Theorem for Hypergraphs -- On the Communication Complexity of Co-linearity Problems -- An Invitation to Play -- Papers -- The Complexity of Satisfiability Problems: Refin…
Telemedical Applications and Grid Technology -- Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven Grid Developments in the OpenMolGRID Project -- ATLAS Data Challenge 2: A Massive Monte Carlo Production on the Grid -- High Throughput Computing for Spatial Information Processing (HIT-SIP) System …
Themes and Issues -- Dealing with Terabyte Data Sets in Digital Investigations -- Forensics and Privacy-Enhancing Technologies -- A Network-Based Architecture for Storing Digital Evidence -- Digital Forensics: Meeting the Challenges of Scientific Evidence -- Non-Technical Manipulation of Digital Data -- Investigative Techniques -- Detecting Social Engineering -- A Framework for Email Investigat…
Case-Based Reasoning -- Neuro-symbolic System for Business Internal Control -- Applying Case Based Reasoning Approach in Analyzing Organizational Change Management Data -- Improving the K-NN Classification with the Euclidean Distance Through Linear Data Transformations -- An IBR System to Quantify the Ocean’s Carbon Dioxide Budget -- A Beta-Cooperative CBR System for Constructing a Business M…
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Imprecisen…
Face Verification Contest 2006 -- Face -- Fingerprint -- Iris -- Speech and Signature -- Biometric Fusion and Performance Evaluation -- Gait and Keystroke -- Others.
Biometrics -- Biometrics: When Identity Matters -- Face Recognition: Technical Challenges and Research Directions -- Fingerprints: Recognition, Performance Evaluation and Synthetic Generation -- Recognising Persons by Their Iris Patterns -- Multiple Classifier Fusion for Biometric Authentication -- Performance Evaluation in 1 : 1 Biometric Engines -- Best Performing Biometric Engines -- Discuss…