Skip to main content
  • Book
  • © 2009

Transactions on Computational Science IV

Special Issue on Security in Computing

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5430)

Part of the book sub series: Transactions on Computational Science (TCOMPUTATSCIE)

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (14 chapters)

  1. Front Matter

  2. Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines

    • Reouven Elbaz, David Champagne, Catherine Gebotys, Ruby B. Lee, Nachiketh Potlapally, Lionel Torres
    Pages 1-22
  3. Behavioural Characterization for Network Anomaly Detection

    • Victor P. Roche, Unai Arronategui
    Pages 23-40
  4. The Power of Anonymous Veto in Public Discussion

    • Feng Hao, Piotr ZieliÅ„ski
    Pages 41-52
  5. Collusion-Resistant Message Authentication in Overlay Multicast Communication

    • Emad Eldin Mohamed, Hussein Abdel-Wahab
    Pages 53-67
  6. A Model for Authentication Credentials Translation in Service Oriented Architecture

    • Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson T. de Camargo, Davi da Silva Böger
    Pages 68-86
  7. An Integrated ECC-MAC Based on RS Code

    • Jaydeb Bhaumik, Dipanwita Roy Chowdhury
    Pages 117-135
  8. Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks

    • Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham
    Pages 136-148
  9. Role Based Access Control with Spatiotemporal Context for Mobile Applications

    • Subhendu Aich, Samrat Mondal, Shamik Sural, Arun Kumar Majumdar
    Pages 177-199
  10. A Hardware Architecture for Integrated-Security Services

    • Fábio Dacêncio Pereira, Edward David Moreno Ordonez
    Pages 215-229
  11. Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology

    • Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti et al.
    Pages 230-243
  12. Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection

    • Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su et al.
    Pages 244-262
  13. Back Matter

About this book

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.

This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14 extensive papers selected for inclusion in this volume give an in-depth coverage of a number of hot topics in the field, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.

Keywords

  • Error-correcting Code
  • FPGA performance
  • Information
  • Performance
  • Service Oriented Architecture (SOA)
  • algorithm
  • algorithms
  • anonymous veto
  • clustering
  • communication
  • communication interfaces
  • embedded security systems
  • error correcting code
  • hardware integrity
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science, University of Calgary, Calgary, Canada

    Marina L. Gavrilova

  • OptimaNumerics Ltd., Belfast, UK

    C. J. Kenneth Tan

  • University of Amazonas State - UEA Manaus, Brazil

    Edward David Moreno

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions