Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A).- A Security Requirement Management Database Based on ISO/IEC 15408.- Development of Committee Neural Network for Computer Access Security System.- C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model.- Design and Fabrication of Security and Home Automation System.- PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design.- Experiments and Hardware Countermeasures on Power Analysis Attacks.- Information System Modeling for Analysis of Propagation Effects and Levels of Damage.- A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks.- A VLSM Address Management Method for Variable IP Subnetting.- SDSEM: Software Development Success Evolution Model.- A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks.- Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications.- The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks.- Ontology-Based Information Search in the Real World Using Web Services.- An Active Node Set Maintenance Scheme for Distributed Sensor Networks.- Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment.- Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector.- Applying Product Line to the Embedded Systems.- Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold.- Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents.- Design of H.264/AVC-Based Software Decoder for Mobile Phone.- Transforming a Legacy System into Components.- Pseudorandom Number Generator Using Optimal Normal Basis.- Efficient Nonce-Based Authentication Scheme Using Token-Update.- An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool.- A Prediction Method of Network Traffic Using Time Series Models.- An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions.- Intersection Simulation System Based on Traffic Flow Control Framework.- A HIICA(Highly-Improved Intra CA) Design for M-Commerce.- Highly Reliable Synchronous Stream Cipher System for Link Encryption.- Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network.- Hybrid Image Mosaic Construction Using the Hierarchical Method.- Workshop on Applied Cryptography and Information Security (ACIS 2006).- Public Key Encryption with Keyword Search Based on K-Resilient IBE.- A Generic Construction of Secure Signatures Without Random Oracles.- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption.- Traceable Signature: Better Efficiency and Beyond.- On the TYS Signature Scheme.- Efficient Partially Blind Signatures with Provable Security.- A Framework for Robust Group Key Agreement.- BGN Authentication and Its Extension to Convey Message Commitments.- New Security Problem in RFID Systems “Tag Killing”.- A Model for Security Vulnerability Pattern.- A New Timestamping Scheme Based on Skip Lists.- A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques.- New Constructions of Universal Hash Functions Based on Function Sums.- Analysis of Fast Blockcipher-Based Hash Functions.- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms.- Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.- Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture.- Workshop on Internet Communications Security (WICS 2006).- Security Weaknesses in Two Proxy Signature Schemes.- A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths.- Comparative Analysis of IPv6 VPN Transition in NEMO Environments.- A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream.- Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO.- An Inter-domain Key Agreement Protocol Using Weak Passwords.- A Practical Solution for Distribution Rights Protection in Multicast Environments.- Audit-Based Access Control in Nomadic Wireless Environments.- Workshop on Optimization: Theories and Applications (OTA 2006).- Cost – Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems.- The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution.- Satisfying Constraints for Locating Export Containers in Port Container Terminals.- A Price Discrimination Modeling Using Geometric Programming.- Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation.- Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning.- Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain.- Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.- Scheduling an R&D Project with Quality-Dependent Time Slots.- The Bottleneck Tree Alignment Problems.- Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers.- Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment.- Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex.- A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment.- Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method.- Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks.- An Entropy Based Group Setup Strategy for PCB Assembly.- Cross-Facility Production and Transportation Planning Problem with Perishable Inventory.- A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload.- Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times.- The Maximum Integer Multiterminal Flow Problem.- Routing with Early Ordering for Just-In-Time Manufacturing Systems.- A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks.- On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers.- Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk.- Two-Server Network Disconnection Problem.- One-Sided Monge TSP Is NP-Hard.- On Direct Methods for Lexicographic Min-Max Optimization.- Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing.- Linear Convergence of Tatônnement in a Bertrand Oligopoly.- Design for Using Purpose of Assembly-Group.- A Conditional Gaussian Martingale Algorithm for Global Optimization.- Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks.- A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process.- Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem.- An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations.- A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps.- Global Optimization of the Scenario Generation and Portfolio Selection Problems.- A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation.- Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers.- A Group Search Optimizer for Neural Network Training.- Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem.- General Tracks.- Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks.- An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling.- Static Analysis Based Software Architecture Recovery.- A First Approach to a Data Quality Model for Web Portals.- Design for Environment-Friendly Product.- Performance of HECC Coprocessors Using Inversion-Free Formulae.- Metrics of Password Management Policy.- Using UML Packages for Designing Secure Data Warehouses.- Practical Attack on the Shrinking Generator.- A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems.- Stochastic Simulation Method for the Term Structure Models with Jump.- The Ellipsoidal l p Norm Obnoxious Facility Location Problem.- On the Performance of Recovery Rate Modeling.- Using Performance Profiles to Evaluate Preconditioners for Iterative Methods.- Multicast ?-Trees Based on Statistical Analysis.- The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results.- Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management.- The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks.- An Efficient Multicast Tree with Delay and Delay Variation Constraints.- Algorithms on Extended (?, ?)-Matching.- SOM and Neural Gas as Graduated Nonconvexity Algorithms.- Analysis of Multi-domain Complex Simulation Studies.- A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance.- Robust Fault Matched Optical Flow Detection Using 2D Histogram.- Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform.- Optimal Edge Detection Using Perfect Sharpening of Ramp Edges.- Eye Tracking Using Neural Network and Mean-Shift.- The Optimal Feature Extraction Procedure for Statistical Pattern Recognition.- A New Approach for Human Identification Using Gait Recognition.- Erratum.- A Security Requirement Management Database Based on ISO/IEC 15408.