Transactions on Computational Science X: Special Issue on Security in Computing, Part 1

Front Cover
Springer Science & Business Media, Jan 4, 2011 - Business & Economics - 366 pages
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 10th issue of the Transactions on Computational Science, edited by Edward David Moreno, is the first of two publications focusing on security in computing. The 14 papers included in the volume address a wide range of applications and designs, such as new architectures, novel hardware implementations, cryptographic algorithms, and security protocols.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A SmartHome Based eHealth Application
1
NTRULike Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra
25
IdentityBased Key Exchange Protocols without Pairings
42
Building a Side Channel Based Disassembler
78
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices
100
An Adaptive Robust Watermarking Algorithm forAudio Signals Using SVD
131
TrustBased Security Level Evaluation Using Bayesian Belief Networks
154
Implementation of QoSS QualityofSecurity Service for NoCBased SoC Protection
187
Signcryption with Noninteractive Nonrepudiation without Random Oracles
202
BlockLevel Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of ProcessorMemory Transactions
231
AWeakest Precondition Approach to Robustness
261
A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
298
Towards PowerEfficient Secure Processor Design
329
A New PeertoPeer Micropayment Protocol Based on Transferable Debt Token
352
Author Index
364
Copyright

Other editions - View all

Common terms and phrases