Theory of Language Measure and Supervisory Control -- Signed Real Measure of Regular Languages -- Optimal Supervisory Control of Regular Languages -- Robust Optimal Control of Regular Languages -- Advanced Topics in Supervisory Control -- Engineering and Software Applications of Language Measure and Supervisory Control -- Discrete Event Supervisory Control of a Mobile Robotic System -- Optimal …
Analytical Models -- An Analytical Model of a New Packet Marking Algorithm for TCP Flows -- Of Mice and Models -- A Dual Approach to Network Calculus Applying the Legendre Transform -- Service Curve Estimation by Measurement: An Input Output Analysis of a Softswitch Model -- Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach -- Traffic Characterization -- Packet S…
Invited Program -- COPS: Quality of Service vs. Any Service at All -- Beyond Middleware and QoS – Service-Oriented Architectures – Cult or Culture? -- Would Self-organized or Self-managed Networks Lead to Improved QoS? -- Full Papers -- Overlay Networks with Linear Capacity Constraints -- A High-Throughput Overlay Multicast Infrastructure with Network Coding -- On Topological Design of Serv…
Basic Mathematics for QoS -- QoS Metrics -- IP QoS Generic Functional Requirements -- IP Integrated Services and Differentiated Services -- QoS in ATM Networks -- MPLS -- References.QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic …
Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks …
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail S…
Keynote Addresses -- Competitive Product Engineering: 10 Powerful Principles for Winning Product Leadership, Through Advanced Systems Engineering, Compared to10 Failure Paths Still Popular in Current Culture -- From Products and Solutions to End-User Experiences -- Systems and Software Process Improvement -- What Formal Models Cannot Show Us: People Issues During the Prototyping Process -- Proc…
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity …