Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Workshop Proceedings -- Aggregating Correlated Data in Sensor Networks -- The Efficiency of Optimal Taxes -- Congestion Games, Load Balancing, and Price of Anarchy -- Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives -- Limits and Power Laws of Models for the Web Graph and Other Networked Information Spaces -- Cuts and Disjoint Paths in the Valley-Free Pa…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Invited Talk -- Pattern Matching over a Dynamic Network of Tuple Spaces -- Models and Calculi -- A Dynamic Class Construct for Asynchronous Concurrent Objects -- An Abstract Machine for the Kell Calculus -- XPi: A Typed Process Calculus for XML Messaging -- UML -- Checking the Validity of Scenarios in UML Models -- An Extended Type System for OCL Supporting Templates and Transformations -- A Se…
Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to t…
A Combined System for Update Logic and Belief Revision -- Using Messaging Structure to Evolve Agents Roles in Electronic Markets -- Specifying DIMA Multi-agents Models Using Maude -- picoPlangent: An Intelligent Mobile Agent System for Ubiquitous Computing -- An Approach to Safe Continuous Planning -- Modeling e-Procurement as Co-adaptive Matchmaking with Mutual Relevance Feedback -- Price Dete…
Vision Papers -- Autonomic Web Processes -- The (Service) Bus: Services Penetrate Everyday Life -- Service Oriented Architectures for Science Gateways on Grid Systems -- Service Specification and Modelling -- Toward a Programming Model for Service-Oriented Computing -- Speaking a Common Language: A Conceptual Model for Describing Service-Oriented Systems -- A Rule Driven Approach for Developing…
Invited Papers -- Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems -- Building Tailored Wireless Sensor Networks -- Users and Services in Intelligent Networks -- Wireless, Mobility and Emergency Network -- MAC Protocol for Contacts from Survivors in Disaster Areas Using Multi-hop Wireless Transmissions -- Performance Evaluation of Mobile IPv6 Wireless Test-Bed i…
Hard Real-Time Development Environments -- Executive Overview on Hard Real-Time Development Environments -- Hard Real-Time System Development -- Current Design Practice and Needs in Selected Industrial Sectors -- Tools for Requirements Capture and Exploration -- Tools for Architecture Design and Capture -- Tools for Programming, Code Generation, and Design -- Tools for Verification and Validati…
Adaptation, Power Consumption and Scheduling -- Energy Management for Embedded Multithreaded Processors with Integrated EDF Scheduling -- Reducing System Level Power Consumption for Mobile and Embedded Platforms -- Implementing Control Algorithms Within a Multithreaded Java Microcontroller -- Adaptivity for Quality and Timeliness Flexible Real-Time Systems -- Adaptation and Agents -- Apricot Ag…