Computer Security - ESORICS 98


Book Description

This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.




Computer Security - ESORICS 2000


Book Description

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.




Computer Security - ESORICS 2005


Book Description

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating.




Computer Security - ESORICS 2004


Book Description

This book constitutes the refereed proceedings of the 9th European Symposium on Research in Computer Security, ESORICS 2004, held in Sophia Antipolis, France in September 2004. The 27 revised full papers presented were carefully reviewed and selected from 159 submissions. Among the topics addressed are access control, authorization frameworks, privacy policies, security protocols, trusted computing, anonymity, information hiding, steganography, digital signature schemes, encrypted communication, information flow control, authentication, key distribution, public key cryptography, intrusion prevention, and attack discovery.




Automated Reasoning


Book Description

This book constitutes the refereed proceedings of the First International Joint Conference on Automated Reasoning, IJCAR 2001, held in Siena, Italy, in June 2001. The 37 research papers and 19 system descriptions presented together with three invited contributions were carefully reviewed and selected from a total of 112 submissions. The book offers topical sections on description, modal, and temporal logics; saturation based theorem proving, applications, and data structures; logic programming and nonmonotonic reasoning; propositional satisfiability and quantified Boolean logic; logical frameworks, higher-order logic, and interactive theorem proving; equational theorem proving and term rewriting; tableau, sequent, and natural deduction calculi and proof theory; automata, specification, verification, and logics of programs; and nonclassical logics.




Advanced Topics in Artificial Intelligence


Book Description

This book constitutes the refereed proceedings of the 10th Australian Joint Conference on Artificial Intelligence, AI'97, held in Perth, Australia, in November/December 1997. The volume presents 48 revised full papers selected from a total of 143 submissions. Also included are three keynote talks and one invited paper. The book is divided into topical sections on constraint satisfaction and scheduling, computer vision, distributed AI, evolutionary computing, knowledge-based systems, knowledge representation and reasoning, learning and machine vision, machine learning, NLP and user modeling, neural networks, robotics and machine recognition, and temporal qualitative reasoning.




Information Security and Cryptology - ICISC 2000


Book Description

This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000. The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.




Smart Card Programming and Security


Book Description

This book constitutes the refereed proceedings of the Second International Conference on Research in Smart Cards, E-smart 2001, held in Cannes, France, in September 2001. The 20 revised full papers presented were carefully reviewed and selected from 38 submissions. Among the topics addressed are biometrics, cryptography and electronic signatures on smart card security, formal methods for smart card evaluation and certification, architectures for multi-applications and secure open platforms, and middleware for smart cards and novel applications of smart cards.




Workflow Management Systems for Process Organisations


Book Description

All of us have learned a lot during this exercise, and the enormous success of the first edition of this book shows the great international interest for the topic and the results. A French edition appeared last year and met with equal interest. Springer-Verlag has therefore decided to publish a second edition of this book, which is not just a reprint but brings the literature and results to the newest state. This is a rare occurrence in the history of the LNCS series. We congratulate Thomas Schael on this success, and we are sure that reader- scientists and practitioners - will likewise profit from it. Aachen and Milan Giorgio De Michelis, Klaus Henning, Matthias Jarke August 1998 Preface to the Second Edition This book is a bit of a mixture of scientific and management literature. It is based on my research activities in the CSCW community, and also reflects the last ten years of my professional experience in consulting. I have had the opportunity to live in different cultural settings, to work in many companies, and to meet people all over the world, which has helped me to reflect on what I was doing and to focus on the content of this book. This second edition reflects the fast moving field of Computer Supported Cooperative Work (CSCW) and the discussion on Business Process Re-engineering (BPR). It contains the latest developments in the scientific and managerial discussion of the issues developed in the first edition.




Secure Information Networks


Book Description

This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) IT Sicherheit conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The Conference aims to provide an international forum for presentations and discussions on protocols and techniques for providing secure information networks. The contributions in this volume review the state-of the-art in communications and multimedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols for entity authentication and key agreement, protocols for mobile environments, applied cryptology, watermarking, smart cards, and legal aspects of digital signatures.