Skip to main content
  • Book
  • © 2010

Transactions on Computational Science X

Special Issue on Security in Computing, Part I

  • Contains detailed papers on up-to-date topics in cryptography
  • Gives a thorough coverage of the vital area of information security
  • Includes an Editorial by the Guest Editor giving a concise but informative introduction to each paper

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6340)

Part of the book sub series: Transactions on Computational Science (TCOMPUTATSCIE)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 chapters)

  1. Front Matter

  2. A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application

    • Luca Compagna, Paul El Khoury, Fabio Massacci, Ayda Saidane
    Pages 1-24
  3. Identity-Based Key Exchange Protocols without Pairings

    • Dario Fiore, Rosario Gennaro
    Pages 42-77
  4. Building a Side Channel Based Disassembler

    • Thomas Eisenbarth, Christof Paar, Björn Weghenkel
    Pages 78-99
  5. An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD

    • Malay Kishore Dutta, Vinay K. Pathak, Phalguni Gupta
    Pages 131-153
  6. Trust-Based Security Level Evaluation Using Bayesian Belief Networks

    • Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty
    Pages 154-186
  7. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    • Johanna Sepúlveda, Ricardo Pires, Marius Strum, Wang Jiang Chau
    Pages 187-201
  8. Signcryption with Non-interactive Non-repudiation without Random Oracles

    • Jia Fan, Yuliang Zheng, Xiaohu Tang
    Pages 202-230
  9. Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions

    • Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez
    Pages 231-260
  10. A Weakest Precondition Approach to Robustness

    • Musard Balliu, Isabella Mastroeni
    Pages 261-297
  11. PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware

    • Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
    Pages 298-328
  12. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    • Siddhartha Chhabra, Yan Solihin
    Pages 329-351
  13. A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token

    • Sung-Ming Yen, Kuo-Zhe Chiou, Je Zhang, Po-Han Lee
    Pages 352-363
  14. Back Matter

About this book

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 10th issue of the Transactions on Computational Science, edited by Edward David Moreno, is the first of two publications focusing on security in computing. The 14 papers included in the volume address a wide range of applications and designs, such as new architectures, novel hardware implementations, cryptographic algorithms, and security protocols.

Editors and Affiliations

  • Department of Computer Science, University of Calgary, Calgary, Canada

    Marina L. Gavrilova

  • Exascala Ltd., Birmingham, UK

    C. J. Kenneth Tan

  • DCOMP/UFS - Federal University of Sergipe, Aracaju, Brazil

    Edward David Moreno

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access