Conservation of Combinatorial Structures in Evolution Scenarios -- Toward a Phylogenetically Aware Algorithm for Fast DNA Similarity Search -- Multiple Genome Alignment by Clustering Pairwise Matches -- On the Structure of Reconciliations -- The Statistical Significance of Max-Gap Clusters -- Identifying Evolutionarily Conserved Segments Among Multiple Divergent and Rearranged Genomes -- Genome…
Lower Bounds for Maximum Parsimony with Gene Order Data -- Genes Order and Phylogenetic Reconstruction: Application to ?-Proteobacteria -- Maximizing Synteny Blocks to Identify Ancestral Homologs -- An Expectation-Maximization Algorithm for Analysis of Evolution of Exon-Intron Structure of Eukaryotic Genes -- Likely Scenarios of Intron Evolution -- OMA, A Comprehensive, Automated Project for th…
Authorisation -- A Multipurpose Delegation Proxy for WWW Credentials -- Secure Role Activation and Authorization in the Enterprise Environment -- Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4 -- Interoperability -- A Heterogeneous Network Access Service Based on PERMIS and SAML -- Interoperation Betwe…
Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks …
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail S…
General Issues -- Learning User Preferences in Distributed Calendar Scheduling -- Semantic Components for Timetabling -- An Open Interactive Timetabling Tool -- Distributed Choice Function Hyper-heuristics for Timetabling and Scheduling -- Transport Timetabling -- A Hybridised Integer Programming and Local Search Method for Robust Train Driver Schedules Planning -- Logistics Service Network Des…
Workshop Report -- Workshop Report -- Security and Incentives -- A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn -- A First Look at Peer-to-Peer Worms: Threats and Defenses -- A Taxonomy of Rational Attacks -- Search -- Brushwood: Distributed Trees in Peer-to-Peer Systems -- Arpeggio: Metadata Searching and Content Sharing with Chord -- OverCite: A Cooperative Dig…
Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) -- Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) -- I Miscellaneous -- A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems -- On the Cost of Participating in a Peer-to-Peer Network -- 2 P2P or Not 2 P2P? -- II Networking -- On Transport …