Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail S…
The Influence of Context on Privacy, Trust and Security -- Some Research Challenges in Pervasive Computing -- Overview -- Survey on Location Privacy in Pervasive Computing -- Exploring the Relationship Between Context and Privacy -- Privacy, Security and Trust Issues Raised by the Personal Server Concept -- Secure Trust Models and Management in Pervasive Computing -- Overview -- The Role of Ide…
Solving the Nonlinear Schrödinger Equation -- Modulation and Detection Techniques for DWDW Systems -- Best Optical Filtering for Duobinary Transmission -- Theoretical Limits for the Dispersion Limited Optical Channel -- Capacity Bounds for Mimo Poisson Channels with Inter-symbol interference -- QSpace Project: Quantum Cryptography in Space -- Quantum-aided Classical Cryptography with a Moving …
Distributed Objects and Applications (DOA) 2005 International Conference (continued) -- Evaluation of Three Approaches for CORBA Firewall/NAT Traversal -- On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model -- Offline Business Objects: Enabling Data Persistence for Distributed Desktop Applications -- Middleware …
OTM 2005 Keynotes -- Probabilistic Ontologies and Relational Databases -- Intelligent Web Service – From Web Services to .Plug&Play. Service Integration -- Process Modeling in Web Applications -- Cooperative Information Systems (CoopIS) 2005 International Conference -- CoopIS 2005 PC Co-chairs’ Message -- Let’s Go All the Way: From Requirements Via Colored Workflow Nets to a BPEL Implemen…
Invited Lectures -- Data Structures I -- Cryptography and Complexity -- Data Structures II -- Cryptography and Distributed Systems -- Graph Algorithms I -- Security Mechanisms -- Graph Algorithms II -- Automata and Formal Languages I -- Signature and Message Authentication -- Algorithmic Game Theory -- Automata and Logic -- Computational Algebra -- Cache-Oblivious Algorithms and Algorithmic Eng…
Invited Papers -- Evolution of Enterprise Information Systems in the Internet Era -- Managing Change — Evolving the EIS Vision -- Automatic Speech Recognition: A Review -- Reasoning with Goals to Engineer Requirements -- Real-Time Knowledge-Based Systems for Enterprise Decision Support and Systems Analysis -- Is Engineering Getting Out of Classical System Engineering -- Databases and Informat…
Information Technology Security -- How can we justify trust in software based systems? -- The capacity of ciphers fulfilling the accessibility of cryptograms -- Parallelization of the Data Encryption Standard (DES) algorithm -- Linked authenticated dictionaries for certificate status verification -- Integrated Payment System for Public Key Infrastructure Services -- Some methods of the analysis…