Transactions on Computational Science X: Special Issue on Security in Computing, Part I

Author:   Marina L. Gavrilova ,  C. J. Kenneth Tan ,  Edward David Moreno
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2011 ed.
Volume:   6340
ISBN:  

9783642174988


Pages:   366
Publication Date:   04 January 2011
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $298.32 Quantity:  
Add to Cart

Share |

Transactions on Computational Science X: Special Issue on Security in Computing, Part I


Add your own review!

Overview

Full Product Details

Author:   Marina L. Gavrilova ,  C. J. Kenneth Tan ,  Edward David Moreno
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2011 ed.
Volume:   6340
Dimensions:   Width: 15.50cm , Height: 2.30cm , Length: 23.60cm
Weight:   0.580kg
ISBN:  

9783642174988


ISBN 10:   3642174981
Pages:   366
Publication Date:   04 January 2011
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application.- NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra.- Identity-Based Key Exchange Protocols without Pairings.- Building a Side Channel Based Disassembler.- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices.- An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD.- Trust-Based Security Level Evaluation Using Bayesian Belief Networks.- Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection.- Signcryption with Non-interactive Non-repudiation without Random Oracles.- Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions.- A Weakest Precondition Approach to Robustness.- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware.- Green Secure Processors: Towards Power-Efficient Secure Processor Design.- A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List