hal. 217-219
TTA Supported Service Availability -- The Value of Conformance Testing and a Look at the SAF Test Project -- Building Highly Available Application Using SA Forum Cluster: A Case Study of GGSN Application -- Using Logical Data Protection and Recovery to Improve Data Availability -- Contract-Based Web Service Composition Framework with Correctness Guarantees -- Practical Approach to Specification…
ISAS 2004 -- Architecture of Highly Available Databases -- Data Persistence in Telecom Switches -- Distributed Redundancy or Cluster Solution? An Experimental Evaluation of Two Approaches for Dependable Mobile Internet Services -- OpenHPI: An Open Source Reference Implementation of the SA Forum Hardware Platform Interface -- Quality of Service Control by Middleware -- Benefit Evaluation of High…
Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operati…
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
hal. 255-262
Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme fr…