Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinkin…
Beyond ROI -- Supply Chain Simulation -- Inventory Management in High Technology Value Chains -- Product Pricing in the e-Business Era -- Applications of Implosion in Manufacturing -- Strategic Sourcing and Procurement -- Managing Risk with Structured Supply Agreements -- Reverse Logistics — Capturing Value in the Extended Supply Chain -- Service Parts Logistics Management -- Business Process…
Service -- Implementation and Usability Evaluation of AAC System for Handicapped Persons -- Tracking Data Management of Spatial DBMS Using Topology for Location-Based Services -- Optimized Initiation Phases for Anonymous Auction Protocols -- Wireless I -- mSCTP for Vertical Handover Between Heterogeneous Networks -- Increasing TCP Capacity in Wireless Multihop Networks -- A Study on Scalable Bl…
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
A Framework for Building Customized Adaptation Proxies -- Adaptable Services and Applications for Networks -- Improvement of MPLS Performance by Implementation of a Multi-Agent System -- Enabling Mobile Commerce Through Location Based Services -- Inter-Domain Traffic Engineering Using Mpls -- Autonomic Service Configuration by a Combined State Machine and Reasoning Engine Based Actor -- Self-Ma…
The Age of IPv6 -- Protocol Architecture -- Address Architecture -- Internet Control Message Protocol for IPv6 (ICMPv6) -- Neighbor Discovery -- Address Autoconfiguration -- Dynamic Host Configuration Protocol (DHCPv6) -- Interconnection between IPv4 and IPv6 -- Domain Name System (DNS) -- Mobility Support for IPv6 -- Enhanced Handover Schemes for Mobile IPv6 -- Security in Mobile IP.IPv6, Inte…
Iris -- Face I (Short) -- Finger-I (Short) -- Face-I -- Fingerprint -- Security and Smartcard -- Short Oral -- Short Oral-4 -- Fusion -- Multi-modal -- 50 – 5:50 Oral-7 (Palm and Finger Surface) -- Speaker and Gait -- Face II -- Poster I -- Poster II.This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AV…
Harmony: The Art of Reconciliation -- A Theory of Noninterference for the ?-Calculus -- Typed Processes in Untyped Contexts -- Model–Based Testing of Cryptographic Protocols -- A General Name Binding Mechanism -- Types for Security in a Mobile World -- History-Based Access Control for Distributed Processes -- Programming Cryptographic Protocols -- A Framework for Analyzing Probabilistic Proto…
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry --…
Invited Talks -- Digital Fountains and Their Application to Informed Content Delivery over Adaptive Overlay Networks -- Securing the Net: Challenges, Failures and Directions -- Regular Papers -- Coterie Availability in Sites -- Keeping Denial-of-Service Attackers in the Dark -- On Conspiracies and Hyperfairness in Distributed Computing -- On the Availability of Non-strict Quorum Systems -- Musi…