Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operati…
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk …
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…
Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme fr…
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontol…
Data-Based Applications -- to OGSA-DAI Services -- Using OGSA-DQP to Support Scientific Applications for the Grid -- Mobile Agent-Based Service Provision in Distributed Data Archives -- A Proxy Service for the xrootd Data Server -- A Flexible Two-Level I/O Architecture for Grids -- Data Driven Infrastructure and Policy Selection to Enhance Scientific Applications in Grid -- BioApplications -- M…
Scenarios: Models, Transformations and Tools -- Why Timed Sequence Diagrams Require Three-Event Semantics -- Some Methodological Observations Resulting from Experience Using LSCs and the Play-In/Play-Out Approach -- Deciding Properties of Message Sequence Charts -- Operational Semantics of Security Protocols -- Autonomous Shuttle System Case Study -- Genetic Design: Amplifying Our Ability to De…
The Object Flow Graph -- Class Diagram -- Object Diagram -- Interaction Diagrams -- State Diagrams -- Package Diagram -- Conclusions.In software evolution and maintenance, the ultimate, most reliable description of a system is its source code. Reverse engineering aims at extracting abstract, goal-oriented views from the code, to summarize relevant properties of program computations. Reverse Eng…