Read While You Wait - Get immediate ebook access, if available*, when you order a print book

Transactions on Computational Science

Transactions on Computational Science IV

Special Issue on Security in Computing

Editors: Editor-in-chief: Tan, Kenneth

Free Preview

Buy this book

eBook $74.99
price for USA in USD
  • ISBN 978-3-642-01004-0
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA in USD
  • ISBN 978-3-642-01003-3
  • Free shipping for individuals worldwide. COVID-19 shipping restrictions apply.
  • Immediate ebook access, if available*, with your print order
  • Usually ready to be dispatched within 3 to 5 business days.
About this book

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.

This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14 extensive papers selected for inclusion in this volume give an in-depth coverage of a number of hot topics in the field, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.

Table of contents (14 chapters)

Table of contents (14 chapters)
  • Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines

    Pages 1-22

    Elbaz, Reouven (et al.)

  • Behavioural Characterization for Network Anomaly Detection

    Pages 23-40

    Roche, Victor P. (et al.)

  • The Power of Anonymous Veto in Public Discussion

    Pages 41-52

    Hao, Feng (et al.)

  • Collusion-Resistant Message Authentication in Overlay Multicast Communication

    Pages 53-67

    Mohamed, Emad Eldin (et al.)

  • A Model for Authentication Credentials Translation in Service Oriented Architecture

    Pages 68-86

    Mello, Emerson Ribeiro (et al.)

Buy this book

eBook $74.99
price for USA in USD
  • ISBN 978-3-642-01004-0
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA in USD
  • ISBN 978-3-642-01003-3
  • Free shipping for individuals worldwide. COVID-19 shipping restrictions apply.
  • Immediate ebook access, if available*, with your print order
  • Usually ready to be dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Transactions on Computational Science IV
Book Subtitle
Special Issue on Security in Computing
Editors
  • Kenneth Tan
Series Title
Transactions on Computational Science
Series Volume
5430
Copyright
2009
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-642-01004-0
DOI
10.1007/978-3-642-01004-0
Softcover ISBN
978-3-642-01003-3
Series ISSN
1866-4733
Edition Number
1
Number of Pages
XVIII, 263
Topics

*immediately available upon purchase as print book shipments may be delayed due to the COVID-19 crisis. ebook access is temporary and does not include ownership of the ebook. Only valid for books with an ebook version. Springer Reference Works and instructor copies are not included.