Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer-Verlag, c2009 |
Descrizione fisica | 1 online resource (XVIII, 263 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
GavrilovaMarina L
MorenoEdward David TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection |
ISBN | 3-642-01004-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Altri titoli varianti |
Transactions on computational science 4
Transactions on computational science four |
Record Nr. | UNISA-996465988603316 |
Berlin, : Springer-Verlag, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on computational science IV : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer-Verlag, c2009 |
Descrizione fisica | 1 online resource (XVIII, 263 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
GavrilovaMarina L
MorenoEdward David TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection |
ISBN | 3-642-01004-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Altri titoli varianti |
Transactions on computational science 4
Transactions on computational science four |
Record Nr. | UNINA-9910485030203321 |
Berlin, : Springer-Verlag, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|