000 04469nam a22005655i 4500
001 u375517
003 SIRSI
005 20160812084327.0
007 cr nn 008mamaa
008 101207s2010 gw | s |||| 0|eng d
020 _a9783642174995
_9978-3-642-17499-5
040 _cMX-MeUAM
050 4 _aTK5105.5-5105.9
082 0 4 _a004.6
_223
100 1 _aGavrilova, Marina L.
_eeditor.
245 1 0 _aTransactions on Computational Science X
_h[recurso electrónico] :
_bSpecial Issue on Security in Computing, Part I /
_cedited by Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXVIII, 366p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6340
505 0 _aA Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application -- NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra -- Identity-Based Key Exchange Protocols without Pairings -- Building a Side Channel Based Disassembler -- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices -- An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD -- Trust-Based Security Level Evaluation Using Bayesian Belief Networks -- Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions -- A Weakest Precondition Approach to Robustness -- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware -- Green Secure Processors: Towards Power-Efficient Secure Processor Design -- A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token.
520 _aThe LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 10th issue of the Transactions on Computational Science, edited by Edward David Moreno, is the first of two publications focusing on security in computing. The 14 papers included in the volume address a wide range of applications and designs, such as new architectures, novel hardware implementations, cryptographic algorithms, and security protocols.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSoftware Engineering.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aData Encryption.
700 1 _aTan, C. J. Kenneth.
_eeditor.
700 1 _aMoreno, Edward David.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642174988
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6340
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-17499-5
596 _a19
942 _cLIBRO_ELEC
999 _c203397
_d203397