This book constitutes the refereed proceedings of the 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2003, held in Heidelberg, Germany in October 2002.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2001, held in Cambridge, MA, USA, in June 2001.
ASIACRYPT'98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22.
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography.
This volume constitutes the refereed proceedings of the Second International Conference on Scale-Space Theories in Computer Vision, Scale-Space'99, held in Corfu, Greece, in September 1999.
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC).
Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network.
In this monograph, Joachim Baumann provides in-depth coverage of essential research issues; namely, mechanisms for locating and terminating mobile agents and for orphan detection in a mobile agent system.
The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa.
This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM'99), which took place at the ETH Zurich in Switzerland and was hosted by the Computer Engineering and Networking Laboratory, TIK.
Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics and lawyers, economists and business practitioners.