General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case…
Keynote and Invited Talks -- Research Session 1: XML -- Research Session 2: Performance and Query Evaluation -- Research Session 3: Data Mining (I) -- Research Session 4: Semantic Web and Web Ontology -- Research Session 5: Data Management (I) -- Research Session 6: Information Systems -- Research Session 7: Web Services and Workflow (I) -- Research Session 8: Data Management (II) -- Research S…
Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploitin…
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distr…
Book Introduction -- Iterative Codes in Magnetic Storage Systems -- Turbo Product Codes for Optical Recording Systems -- Turbo and Turbo-like Code Design in ADSL Modems -- Turbo Codes for Single-Mode and Multimode Fiber Optic Communications -- Iterative Demodulation and Decoding -- Turbo Receiver Techniques for Coded MIMO OFDM Systems -- Space-Time Turbo Coded Modulation for Future Wireless Com…
Genesis and Theory of Computer Viruses -- The Formalization Foundations: from Turing to von Neumann (1936 – 1967) -- F. Cohen and L. Adleman’s Formalization (1984 – 1989) -- Taxonomy, Techniques and Tools -- Fighting Against Viruses -- Learning Computer Viruses by Programming -- Computer Viruses in Interpreted Programming Language -- Companion Viruses -- Worms -- Computer Viruses and Appl…
Web Intelligence, World Knowledge and Fuzzy Logic -- Towards More Powerful Information Technology via Computing with Words and Perceptions: Precisiated Natural Language, Protoforms and Linguistic Data Summaries -- Enhancing the Power of Search Engines and Navigations Based on Conceptual Model: Web Intelligence -- Soft Computing for Perception-Based Decision Processing and Analysis: Web-Based BI…
Security Protocol Design -- Challenges in Protocol Design and Analysis -- Private Matching -- Authentication Protocol Analysis -- Self-Certified Approach for Authenticated Key Agreement -- P2P and Ad Hoc Networks -- Experimenting with Admission Control in P2P Networks -- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- Intrusion Detection, Defense, Measurement -- Measuri…
CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems -- Defining and Decomposing Safety Policy for Systems of Systems -- Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Dat…
Ontologies for the Semantic Web -- Web Services Overview for Net-Centric Operations -- Metadata Concepts to Support a Net-Centric Data Environment -- Distributed Geospatial Intelligence Integration and Interoperability Through the Gidb® Portal System -- Analyzing Intelligence Data -- Linking Military Systems with Simulations and Intelligent Agents Through Web Services to Support Courses of Act…