Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
A Framework for Building Customized Adaptation Proxies -- Adaptable Services and Applications for Networks -- Improvement of MPLS Performance by Implementation of a Multi-Agent System -- Enabling Mobile Commerce Through Location Based Services -- Inter-Domain Traffic Engineering Using Mpls -- Autonomic Service Configuration by a Combined State Machine and Reasoning Engine Based Actor -- Self-Ma…
The Age of IPv6 -- Protocol Architecture -- Address Architecture -- Internet Control Message Protocol for IPv6 (ICMPv6) -- Neighbor Discovery -- Address Autoconfiguration -- Dynamic Host Configuration Protocol (DHCPv6) -- Interconnection between IPv4 and IPv6 -- Domain Name System (DNS) -- Mobility Support for IPv6 -- Enhanced Handover Schemes for Mobile IPv6 -- Security in Mobile IP.IPv6, Inte…
Iris -- Face I (Short) -- Finger-I (Short) -- Face-I -- Fingerprint -- Security and Smartcard -- Short Oral -- Short Oral-4 -- Fusion -- Multi-modal -- 50 – 5:50 Oral-7 (Palm and Finger Surface) -- Speaker and Gait -- Face II -- Poster I -- Poster II.This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AV…
Harmony: The Art of Reconciliation -- A Theory of Noninterference for the ?-Calculus -- Typed Processes in Untyped Contexts -- Model–Based Testing of Cryptographic Protocols -- A General Name Binding Mechanism -- Types for Security in a Mobile World -- History-Based Access Control for Distributed Processes -- Programming Cryptographic Protocols -- A Framework for Analyzing Probabilistic Proto…
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry --…
Invited Talks -- Digital Fountains and Their Application to Informed Content Delivery over Adaptive Overlay Networks -- Securing the Net: Challenges, Failures and Directions -- Regular Papers -- Coterie Availability in Sites -- Keeping Denial-of-Service Attackers in the Dark -- On Conspiracies and Hyperfairness in Distributed Computing -- On the Availability of Non-strict Quorum Systems -- Musi…
Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Workshop Proceedings -- Aggregating Correlated Data in Sensor Networks -- The Efficiency of Optimal Taxes -- Congestion Games, Load Balancing, and Price of Anarchy -- Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives -- Limits and Power Laws of Models for the Web Graph and Other Networked Information Spaces -- Cuts and Disjoint Paths in the Valley-Free Pa…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…