to Multimedia Security -- Digital Rights Management for Multimedia -- Multimedia Cryptography -- to Multimedia Encryption -- An Overview of Modern Cryptography -- Important Modern Cryptosystems -- Image Encryption Algorithms -- Video Encryption Algorithms -- Speech and Audio Encryption -- Visual and Audio Secret Sharing -- Multimedia Watermarking -- to Watermarking -- Applications of Digital Wa…
Themes and Issues -- Dealing with Terabyte Data Sets in Digital Investigations -- Forensics and Privacy-Enhancing Technologies -- A Network-Based Architecture for Storing Digital Evidence -- Digital Forensics: Meeting the Challenges of Scientific Evidence -- Non-Technical Manipulation of Digital Data -- Investigative Techniques -- Detecting Social Engineering -- A Framework for Email Investigat…
Invited Paper -- XML Databases and Beyond-Plenty of Architectural Challenges Ahead -- Regular Papers Database Theory -- Usable Recursive Queries -- Relation-Collapse: An Optimisation Technique for the Similarity Algebra -- On Modal Deductive Databases -- Declarative Data Fusion – Syntax, Semantics, and Implementation -- Non-destructive Integration of Form-Based Views -- Database Modelling an…
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Trends in Data Mining and Knowledge Discovery -- Advanced Methods for the Analysis of Semiconductor Manufacturing Process Data -- Clustering and Visualization of Retail Market Baskets -- Segmentation of Continuous Data Streams Based on a Change Detection Methodology -- Instance Selection Using Evolutionary Algorithms: An Experimental Study -- Using Cooperative Coevolution for Data Mining of Bay…
to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols.Modern cryptology employs mathematically rigorous concepts and methods from complexity theor…
Algorithmic Problems & Their Complexity -- Fundamental Complexity Classes -- Reductions — Algorithmic Relationships Between Problems -- The Theory of NP-Completeness -- NP-complete and NP-equivalent Problems -- The Complexity Analysis of Problems -- The Complexity of Approximation Problems — Classical Results -- The Complexity of Black Box Problems -- Additional Complexity Classes and Relat…
Security Issues in the Tuple-Space Coordination Model -- Information Flow Analysis for Probabilistic Timed Automata -- Dynamic Security Labels and Noninterference (Extended Abstract) -- Formal Analysis of a Fair Payment Protocol -- Pattern-Matching Spi-Calculus -- Decidability of Opacity with Non-Atomic Keys -- Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards -- Fami…