Transactions on Computational Science X: Special Issue on Security in Computing, Part 1

Front Cover
Springer Science & Business Media, Jan 4, 2011 - Business & Economics - 366 pages
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 10th issue of the Transactions on Computational Science, edited by Edward David Moreno, is the first of two publications focusing on security in computing. The 14 papers included in the volume address a wide range of applications and designs, such as new architectures, novel hardware implementations, cryptographic algorithms, and security protocols.

What people are saying - Write a review

We haven't found any reviews in the usual places.


A SmartHome Based eHealth Application
NTRULike Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra
IdentityBased Key Exchange Protocols without Pairings
Building a Side Channel Based Disassembler
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices
An Adaptive Robust Watermarking Algorithm forAudio Signals Using SVD
TrustBased Security Level Evaluation Using Bayesian Belief Networks
Implementation of QoSS QualityofSecurity Service for NoCBased SoC Protection
Signcryption with Noninteractive Nonrepudiation without Random Oracles
BlockLevel Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of ProcessorMemory Transactions
AWeakest Precondition Approach to Robustness
A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Towards PowerEfficient Secure Processor Design
A New PeertoPeer Micropayment Protocol Based on Transferable Debt Token
Author Index

Other editions - View all

Common terms and phrases