Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Ma…
Analytical Models -- An Analytical Model of a New Packet Marking Algorithm for TCP Flows -- Of Mice and Models -- A Dual Approach to Network Calculus Applying the Legendre Transform -- Service Curve Estimation by Measurement: An Input Output Analysis of a Softswitch Model -- Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach -- Traffic Characterization -- Packet S…
Invited Program -- COPS: Quality of Service vs. Any Service at All -- Beyond Middleware and QoS – Service-Oriented Architectures – Cult or Culture? -- Would Self-organized or Self-managed Networks Lead to Improved QoS? -- Full Papers -- Overlay Networks with Linear Capacity Constraints -- A High-Throughput Overlay Multicast Infrastructure with Network Coding -- On Topological Design of Serv…
Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks …
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Keynote Addresses -- Competitive Product Engineering: 10 Powerful Principles for Winning Product Leadership, Through Advanced Systems Engineering, Compared to10 Failure Paths Still Popular in Current Culture -- From Products and Solutions to End-User Experiences -- Systems and Software Process Improvement -- What Formal Models Cannot Show Us: People Issues During the Prototyping Process -- Proc…
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity …
Policies on Information and Communication Technology in Society -- Perspectives and Policies on ICT in Africa -- ICT in China: A strong Force to Boost Economic and Social development -- ICT Policies of the European Union: From an Information Society to eEurope. Trends and visions -- The Information Society in the Asia-Pacific Region India and Australia -- IT STAR in Central and Eastern Europe â…
IPOM in VoIP, IMS and Managed IP Services -- Emergency Telecommunication Support for IP Telephony -- On the Interaction of SIP and Admission Control: An Inter-domain Call Authorization Model for Internet Multimedia Applications -- Experimental Evaluation of the IP Multimedia Subsystem -- Open Interfaces, QoS and Pricing in NGNs -- Open Service Access for QoS Control in Next Generation Networks …
Making Metrics a Success — The Business Perspective -- Planning the Measurement Process -- Performing the Measurement Process -- Introducing a Measurement Program -- Measurement Infrastructures -- Size and Effort Estimation -- Project Control -- Defect Detection and Quality Improvement -- Software Process Improvement -- Software Performance Engineering -- Service Level Management -- Case Stud…