Invited Papers -- A Survey of Some Recent Results on Bent Functions -- A Survey of the Merit Factor Problem for Binary Sequences -- A Survey of Feedback with Carry Shift Registers -- Univariate and Multivariate Merit Factors -- Complexity of Sequences I -- Discrete Fourier Transform, Joint Linear Complexity and Generalized Joint Linear Complexity of Multisequences -- Expected Value of the Linea…
Data Models for Semistructured Data -- ORA-SS -- Schema Extraction -- Normalization -- Views -- Physical Database Design -- Conclusion.Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design …
Semantic Web Services -- Automatic Location of Services -- Feta: A Light-Weight Architecture for User Oriented Semantic Service Discovery -- Optimally Distributing Interactions Between Composed Semantic Web Services -- A POP-Based Replanning Agent for Automatic Web Service Composition -- Process-Level Composition of Executable Web Services: ”On-the-fly” Versus ”Once-for-all” Composition…
Service Oriented Computing: Opportunities and Challenges -- Data Semantics Revisited -- Dynamic Agent Composition from Semantic Web Services -- Ontology-Extended Component-Based Workflows : A Framework for Constructing Complex Workflows from Semantically Heterogeneous Software Components -- Data Procurement for Enabling Scientific Workflows: On Exploring Inter-ant Parasitism -- XSDL: Making XML…
Invited Paper -- Using the Semantic Web for e-Science: Inspiration, Incubation, Irritation -- Semantic Acceleration Helping Realize the Semantic Web Vision or “The Practical Web” -- Semantic Web Public Policy Challenges: Privacy, Provenance, Property and Personhood -- Research/Academic Track -- Constructing Complex Semantic Mappings Between XML Data and Ontologies -- Stable Model Theory for…
Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operati…
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…