top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer-Verlag, c2009
Descrizione fisica 1 online resource (XVIII, 263 p.)
Disciplina 005.8
Altri autori (Persone) GavrilovaMarina L
MorenoEdward David
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
ISBN 3-642-01004-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Altri titoli varianti Transactions on computational science 4
Transactions on computational science four
Record Nr. UNISA-996465988603316
Berlin, : Springer-Verlag, c2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on computational science IV : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Transactions on computational science IV : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer-Verlag, c2009
Descrizione fisica 1 online resource (XVIII, 263 p.)
Disciplina 005.8
Altri autori (Persone) GavrilovaMarina L
MorenoEdward David
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
ISBN 3-642-01004-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Altri titoli varianti Transactions on computational science 4
Transactions on computational science four
Record Nr. UNINA-9910485030203321
Berlin, : Springer-Verlag, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui