General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case…
Keynote and Invited Talks -- Research Session 1: XML -- Research Session 2: Performance and Query Evaluation -- Research Session 3: Data Mining (I) -- Research Session 4: Semantic Web and Web Ontology -- Research Session 5: Data Management (I) -- Research Session 6: Information Systems -- Research Session 7: Web Services and Workflow (I) -- Research Session 8: Data Management (II) -- Research S…
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distr…
Invited Lectures -- Bioinformatics -- Networks -- String Algorithms -- Scheduling -- Complexity -- Steiner Trees -- Graph Drawing and Layout Design -- Quantum Computing -- Randomized Algorithms -- Geometry -- Codes -- Finance -- Facility Location -- Graph Theory -- Graph Algorithms -- Others.
Genesis and Theory of Computer Viruses -- The Formalization Foundations: from Turing to von Neumann (1936 – 1967) -- F. Cohen and L. Adleman’s Formalization (1984 – 1989) -- Taxonomy, Techniques and Tools -- Fighting Against Viruses -- Learning Computer Viruses by Programming -- Computer Viruses in Interpreted Programming Language -- Companion Viruses -- Worms -- Computer Viruses and Appl…
Security Protocol Design -- Challenges in Protocol Design and Analysis -- Private Matching -- Authentication Protocol Analysis -- Self-Certified Approach for Authenticated Key Agreement -- P2P and Ad Hoc Networks -- Experimenting with Admission Control in P2P Networks -- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- Intrusion Detection, Defense, Measurement -- Measuri…
Fundamentals -- I Elements -- Centrality Indices -- Algorithms for Centrality Indices -- Advanced Centrality Concepts -- II Groups -- Local Density -- Connectivity -- Clustering -- Role Assignments -- Blockmodels -- Network Statistics -- Network Comparison -- Network Models -- Spectral Analysis -- Robustness and Resilience.‘Network’ is a heavily overloaded term, so that ‘network analysisâ…
Ontologies for the Semantic Web -- Web Services Overview for Net-Centric Operations -- Metadata Concepts to Support a Net-Centric Data Environment -- Distributed Geospatial Intelligence Integration and Interoperability Through the Gidb® Portal System -- Analyzing Intelligence Data -- Linking Military Systems with Simulations and Intelligent Agents Through Web Services to Support Courses of Act…
Fundamental Issues -- Spatial Database Concepts -- The R-Tree and Variations -- Nearest Neighbor Search in Spatial and Spatiotemporal Databases -- Nearest Neighbor Queries -- Analysis of Nearest Neighbor Queries -- Nearest Neighbor Queries in Moving Objects -- Nearest Neighbor Search with Multiple Resources -- Parallel and Distributed Databases -- Multidisk Query Processing -- Multiprocessor Qu…
to Multimedia Security -- Digital Rights Management for Multimedia -- Multimedia Cryptography -- to Multimedia Encryption -- An Overview of Modern Cryptography -- Important Modern Cryptosystems -- Image Encryption Algorithms -- Video Encryption Algorithms -- Speech and Audio Encryption -- Visual and Audio Secret Sharing -- Multimedia Watermarking -- to Watermarking -- Applications of Digital Wa…