Invited Program -- COPS: Quality of Service vs. Any Service at All -- Beyond Middleware and QoS – Service-Oriented Architectures – Cult or Culture? -- Would Self-organized or Self-managed Networks Lead to Improved QoS? -- Full Papers -- Overlay Networks with Linear Capacity Constraints -- A High-Throughput Overlay Multicast Infrastructure with Network Coding -- On Topological Design of Serv…
Basic Mathematics for QoS -- QoS Metrics -- IP QoS Generic Functional Requirements -- IP Integrated Services and Differentiated Services -- QoS in ATM Networks -- MPLS -- References.QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic …
Authorisation -- A Multipurpose Delegation Proxy for WWW Credentials -- Secure Role Activation and Authorization in the Enterprise Environment -- Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4 -- Interoperability -- A Heterogeneous Network Access Service Based on PERMIS and SAML -- Interoperation Betwe…
Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks …
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail S…
Invited Papers -- Coordinating Teams in Uncertain Environments: A Hybrid BDI-POMDP Approach -- Agents – The Challenge of Relevance to the IT Mainstream -- Agent-Oriented Programming -- Goal Representation for BDI Agent Systems -- AF-APL – Bridging Principles and Practice in Agent Oriented Languages -- Agent Platforms and Tools -- A Toolkit for the Realization of Constraint-Based Multiagent …
The Influence of Context on Privacy, Trust and Security -- Some Research Challenges in Pervasive Computing -- Overview -- Survey on Location Privacy in Pervasive Computing -- Exploring the Relationship Between Context and Privacy -- Privacy, Security and Trust Issues Raised by the Personal Server Concept -- Secure Trust Models and Management in Pervasive Computing -- Overview -- The Role of Ide…
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity …