Transactions on Computational Science IV: Special Issue on Security in Computing by C. J. Kenneth TanTransactions on Computational Science IV: Special Issue on Security in Computing by C. J. Kenneth Tan

Transactions on Computational Science IV: Special Issue on Security in Computing

byC. J. Kenneth Tan

Paperback | April 22, 2009

Pricing and Purchase Info

$114.32 online 
$136.95 list price save 16%
Earn 572 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This issue focuses on the theme of security in computing. It offers in-depth coverage of a number of hot topics, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.

Title:Transactions on Computational Science IV: Special Issue on Security in ComputingFormat:PaperbackDimensions:263 pages, 23.5 × 15.5 × 0.07 inPublished:April 22, 2009Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642010032

ISBN - 13:9783642010033

Reviews

Table of Contents

Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.- Behavioural Characterization for Network Anomaly Detection.- The Power of Anonymous Veto in Public Discussion.- Collusion-Resistant Message Authentication in Overlay Multicast Communication.- A Model for Authentication Credentials Translation in Service Oriented Architecture.- Secure and Efficient Group Key Agreements for Cluster Based Networks.- An Integrated ECC-MAC Based on RS Code.- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks.- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools.- Role Based Access Control with Spatiotemporal Context for Mobile Applications.- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.- A Hardware Architecture for Integrated-Security Services.- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.