Invited Papers -- A Survey of Some Recent Results on Bent Functions -- A Survey of the Merit Factor Problem for Binary Sequences -- A Survey of Feedback with Carry Shift Registers -- Univariate and Multivariate Merit Factors -- Complexity of Sequences I -- Discrete Fourier Transform, Joint Linear Complexity and Generalized Joint Linear Complexity of Multisequences -- Expected Value of the Linea…
The Self-Star Vision -- The Self-Star Vision -- Self-organization -- Evolving Fractal Gene Regulatory Networks for Graceful Degradation of Software -- Evolutionary Computing and Autonomic Computing: Shared Problems, Shared Solutions? -- Self-? Topology Control in Wireless Multihop Ad Hoc Communication Networks -- Emergent Consensus in Decentralised Systems Using Collaborative Reinforcement Lear…
Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operati…
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme fr…
New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Arc…
Efficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel …
Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks -- Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks -- Towards an Integrated Protein-Protein Interaction Network -- The Factor Graph Network Model for Biological Systems -- Pairwise Local Alignment of Protein Interaction Networks Guided by Models of Evolution -- Finding Nov…
Basic Concepts -- Problem Formulations -- Convex and Lagrangian Relaxations -- Decomposition Methods -- Semidefinite Relaxations -- Convex Underestimators -- Cuts, Lower Bounds and Box Reduction -- Local and Global Optimality Criteria -- Adaptive Discretization of Infinite Dimensional MINLPs -- Algorithms -- Overview of Global Optimization Methods -- Deformation Heuristics -- Rounding, Partitio…