top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XVIII, 294 p. 122 illus., 48 illus. in color.)
Disciplina 004.6
Altri autori (Persone) GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth)
MorenoEdward D
Collana Lecture notes in computer science
Soggetto topico Computational complexity
Computer science
Numerical calculations - Data processing
Research - Data processing
Science - Data processing
Soggetto non controllato Technology
Science
Computer Science
Computational Complexity
Technology & Engineering
Computers
ISBN 1-283-47743-2
9786613477439
3-642-17697-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483606503321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XVIII, 294 p. 122 illus., 48 illus. in color.)
Disciplina 004.6
Altri autori (Persone) GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth)
MorenoEdward D
Collana Lecture notes in computer science
Soggetto topico Computational complexity
Computer science
Numerical calculations - Data processing
Research - Data processing
Science - Data processing
Soggetto non controllato Technology
Science
Computer Science
Computational Complexity
Technology & Engineering
Computers
ISBN 1-283-47743-2
9786613477439
3-642-17697-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466019503316
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer-Verlag, c2009
Descrizione fisica 1 online resource (XVIII, 263 p.)
Disciplina 005.8
Altri autori (Persone) GavrilovaMarina L
MorenoEdward David
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
ISBN 3-642-01004-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Altri titoli varianti Transactions on computational science 4
Transactions on computational science four
Record Nr. UNINA-9910485030203321
Berlin, : Springer-Verlag, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer-Verlag, c2009
Descrizione fisica 1 online resource (XVIII, 263 p.)
Disciplina 005.8
Altri autori (Persone) GavrilovaMarina L
MorenoEdward David
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
ISBN 3-642-01004-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Altri titoli varianti Transactions on computational science 4
Transactions on computational science four
Record Nr. UNISA-996465988603316
Berlin, : Springer-Verlag, c2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on computational science VI [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Transactions on computational science VI [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer, c2009
Descrizione fisica 1 online resource (XII, 381 p.)
Disciplina 025.04
Altri autori (Persone) GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Science - Data processing
Research - Data processing
Numerical calculations - Data processing
Computer science
Computational complexity
Soggetto non controllato Science
Technology
Computational Complexity
Computer Science
Technology & Engineering
Computers
ISBN 1-280-38333-X
9786613561251
3-642-10649-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Information Systems and Communications -- Volterra – Lax-Wendroff Algorithm for Modelling Sea Surface Flow Pattern from Jason-1 Satellite Altimeter Data -- Guidelines for Web Usability and Accessibility on the Nintendo Wii -- Improving Urban Land Cover Classification Using Fuzzy Image Segmentation -- Connecting the Dots: Constructing Spatiotemporal Episodes from Events Schemas -- Predictive Indexing for Position Data of Moving Objects in the Real World -- SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks -- EDAS: Energy and Distance Aware Protocol Based on SPIN for Wireless Sensor Networks -- Scheme to Prevent Packet Loss during PMIPv6 Handover -- Wavelet Based Approach to Fractals and Fractal Signal Denoising -- Wavelet Analysis of Spike Train in the Fitzhugh Model -- The Design and Implementation of Secure Socket SCTP -- 2: Geographical Analysis and Geometric Modeling -- A General-Purpose Geosimulation Infrastructure for Spatial Decision Support -- Exploratory Spatial Analysis of Illegal Oil Discharges Detected off Canada’s Pacific Coast -- Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data -- Detecting Alluvial Fans Using Quantitative Roughness Characterization and Fuzzy Logic Analysis -- Evaluating the Use of Alternative Distance Metrics in Spatial Regression Analysis of Health Data: A Spatio-temporal Comparison -- Identifying Hazardous Road Locations: Hot Spots versus Hot Zones -- Geographical Analysis of Foreign Immigration and Spatial Patterns in Urban Areas: Density Estimation, Spatial Segregation and Diversity Analysis -- Geostatistics in Historical Macroseismic Data Analysis -- A Discrete Approach to Multiresolution Curves and Surfaces -- On the Structure of Straight Skeletons.
Record Nr. UNISA-996465930503316
Berlin ; ; Heidelberg, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on computational science VI [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Transactions on computational science VI [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer, c2009
Descrizione fisica 1 online resource (XII, 381 p.)
Disciplina 025.04
Altri autori (Persone) GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Science - Data processing
Research - Data processing
Numerical calculations - Data processing
Computer science
Computational complexity
Soggetto non controllato Science
Technology
Computational Complexity
Computer Science
Technology & Engineering
Computers
ISBN 1-280-38333-X
9786613561251
3-642-10649-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Information Systems and Communications -- Volterra – Lax-Wendroff Algorithm for Modelling Sea Surface Flow Pattern from Jason-1 Satellite Altimeter Data -- Guidelines for Web Usability and Accessibility on the Nintendo Wii -- Improving Urban Land Cover Classification Using Fuzzy Image Segmentation -- Connecting the Dots: Constructing Spatiotemporal Episodes from Events Schemas -- Predictive Indexing for Position Data of Moving Objects in the Real World -- SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks -- EDAS: Energy and Distance Aware Protocol Based on SPIN for Wireless Sensor Networks -- Scheme to Prevent Packet Loss during PMIPv6 Handover -- Wavelet Based Approach to Fractals and Fractal Signal Denoising -- Wavelet Analysis of Spike Train in the Fitzhugh Model -- The Design and Implementation of Secure Socket SCTP -- 2: Geographical Analysis and Geometric Modeling -- A General-Purpose Geosimulation Infrastructure for Spatial Decision Support -- Exploratory Spatial Analysis of Illegal Oil Discharges Detected off Canada’s Pacific Coast -- Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data -- Detecting Alluvial Fans Using Quantitative Roughness Characterization and Fuzzy Logic Analysis -- Evaluating the Use of Alternative Distance Metrics in Spatial Regression Analysis of Health Data: A Spatio-temporal Comparison -- Identifying Hazardous Road Locations: Hot Spots versus Hot Zones -- Geographical Analysis of Foreign Immigration and Spatial Patterns in Urban Areas: Density Estimation, Spatial Segregation and Diversity Analysis -- Geostatistics in Historical Macroseismic Data Analysis -- A Discrete Approach to Multiresolution Curves and Surfaces -- On the Structure of Straight Skeletons.
Record Nr. UNINA-9910483003603321
Berlin ; ; Heidelberg, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on computational science VII [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Transactions on computational science VII [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer-Verlag, c2010
Descrizione fisica 1 online resource (163 p. 73 illus.)
Disciplina 518
Altri autori (Persone) GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Computational complexity
Computer science
Numerical calculations - Data processing
Research - Data processing
Science - Data processing
Soggetto non controllato Science
Numerical Calculations
Computer Science
Computational Complexity
Research
Mathematics
Computers
Reference
ISBN 1-280-38545-6
9786613563378
3-642-11389-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Computations of Stochastic Systems Guest Editor: Magdy A. El-Tawil -- Mean Square Convergent Numerical Methods for Nonlinear Random Differential Equations -- A Discrete-Time Geo/G/1 Retrial Queue with Starting Failures and Impatient Customers -- Using Homotopy-WHEP Technique in Solving Nonlinear Diffusion Equation with Stochastic No Homogeneity -- Itô-Stratonovitch Formula for the Wave Equation on a Torus -- The Solution of Non-linear Diffusion Equation under Stochastic Nonhomogeneity Using Symbolic WHEP and Pickard Algorithms -- 2: Computational Methods for Complex Systems -- An Analysis of Secure Processor Architectures -- Compensation of the Scheme Dispersion and Dissipation by Artificial Non-linear Additions -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field -- Grid-Technology for Chemical Reactions Calculation -- Erratum -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field.
Altri titoli varianti Transactions on computational science 7
Transactions on computational science seven
Record Nr. UNISA-996465303603316
Berlin ; ; New York, : Springer-Verlag, c2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on computational science VII [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Transactions on computational science VII [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer-Verlag, c2010
Descrizione fisica 1 online resource (163 p. 73 illus.)
Disciplina 518
Altri autori (Persone) GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth)
Collana Lecture notes in computer science
Soggetto topico Computational complexity
Computer science
Numerical calculations - Data processing
Research - Data processing
Science - Data processing
Soggetto non controllato Science
Numerical Calculations
Computer Science
Computational Complexity
Research
Mathematics
Computers
Reference
ISBN 1-280-38545-6
9786613563378
3-642-11389-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Computations of Stochastic Systems Guest Editor: Magdy A. El-Tawil -- Mean Square Convergent Numerical Methods for Nonlinear Random Differential Equations -- A Discrete-Time Geo/G/1 Retrial Queue with Starting Failures and Impatient Customers -- Using Homotopy-WHEP Technique in Solving Nonlinear Diffusion Equation with Stochastic No Homogeneity -- Itô-Stratonovitch Formula for the Wave Equation on a Torus -- The Solution of Non-linear Diffusion Equation under Stochastic Nonhomogeneity Using Symbolic WHEP and Pickard Algorithms -- 2: Computational Methods for Complex Systems -- An Analysis of Secure Processor Architectures -- Compensation of the Scheme Dispersion and Dissipation by Artificial Non-linear Additions -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field -- Grid-Technology for Chemical Reactions Calculation -- Erratum -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field.
Altri titoli varianti Transactions on computational science 7
Transactions on computational science seven
Record Nr. UNINA-9910483652803321
Berlin ; ; New York, : Springer-Verlag, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on Computational Science X [[electronic resource] ] : Special Issue on Security in Computing, Part I / / edited by Marina L. Gavrilova, C. J. Kenneth Tan
Transactions on Computational Science X [[electronic resource] ] : Special Issue on Security in Computing, Part I / / edited by Marina L. Gavrilova, C. J. Kenneth Tan
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XVIII, 366 p. 111 illus., 68 illus. in color.)
Disciplina 004.6
Collana Transactions on Computational Science
Soggetto topico Computer communication systems
Software engineering
Application software
Management information systems
Computer science
Algorithms
Data encryption (Computer science)
Computer Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Cryptology
ISBN 1-283-47736-X
9786613477361
3-642-17499-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application -- NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra -- Identity-Based Key Exchange Protocols without Pairings -- Building a Side Channel Based Disassembler -- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices -- An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD -- Trust-Based Security Level Evaluation Using Bayesian Belief Networks -- Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions -- A Weakest Precondition Approach to Robustness -- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware -- Green Secure Processors: Towards Power-Efficient Secure Processor Design -- A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token.
Record Nr. UNISA-996466007103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on Computational Science X [[electronic resource] ] : Special Issue on Security in Computing, Part I / / edited by Marina L. Gavrilova, C. J. Kenneth Tan
Transactions on Computational Science X [[electronic resource] ] : Special Issue on Security in Computing, Part I / / edited by Marina L. Gavrilova, C. J. Kenneth Tan
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XVIII, 366 p. 111 illus., 68 illus. in color.)
Disciplina 004.6
Collana Transactions on Computational Science
Soggetto topico Computer communication systems
Software engineering
Application software
Management information systems
Computer science
Algorithms
Data encryption (Computer science)
Computer Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Cryptology
ISBN 1-283-47736-X
9786613477361
3-642-17499-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application -- NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra -- Identity-Based Key Exchange Protocols without Pairings -- Building a Side Channel Based Disassembler -- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices -- An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD -- Trust-Based Security Level Evaluation Using Bayesian Belief Networks -- Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions -- A Weakest Precondition Approach to Robustness -- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware -- Green Secure Processors: Towards Power-Efficient Secure Processor Design -- A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token.
Record Nr. UNINA-9910484011203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui