Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XVIII, 294 p. 122 illus., 48 illus. in color.) |
Disciplina | 004.6 |
Altri autori (Persone) |
GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth) MorenoEdward D |
Collana | Lecture notes in computer science |
Soggetto topico |
Computational complexity
Computer science Numerical calculations - Data processing Research - Data processing Science - Data processing |
Soggetto non controllato |
Technology
Science Computer Science Computational Complexity Technology & Engineering Computers |
ISBN |
1-283-47743-2
9786613477439 3-642-17697-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483606503321 |
Berlin, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XVIII, 294 p. 122 illus., 48 illus. in color.) |
Disciplina | 004.6 |
Altri autori (Persone) |
GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth) MorenoEdward D |
Collana | Lecture notes in computer science |
Soggetto topico |
Computational complexity
Computer science Numerical calculations - Data processing Research - Data processing Science - Data processing |
Soggetto non controllato |
Technology
Science Computer Science Computational Complexity Technology & Engineering Computers |
ISBN |
1-283-47743-2
9786613477439 3-642-17697-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466019503316 |
Berlin, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer-Verlag, c2009 |
Descrizione fisica | 1 online resource (XVIII, 263 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
GavrilovaMarina L
MorenoEdward David TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection |
ISBN | 3-642-01004-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Altri titoli varianti |
Transactions on computational science 4
Transactions on computational science four |
Record Nr. | UNINA-9910485030203321 |
Berlin, : Springer-Verlag, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on computational science IV [[electronic resource] ] : special issue on security in computing / / Marina L. Gavrilova, C.J. Kenneth Tan, Edward David Moreno (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer-Verlag, c2009 |
Descrizione fisica | 1 online resource (XVIII, 263 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
GavrilovaMarina L
MorenoEdward David TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection |
ISBN | 3-642-01004-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines -- Behavioural Characterization for Network Anomaly Detection -- The Power of Anonymous Veto in Public Discussion -- Collusion-Resistant Message Authentication in Overlay Multicast Communication -- A Model for Authentication Credentials Translation in Service Oriented Architecture -- Secure and Efficient Group Key Agreements for Cluster Based Networks -- An Integrated ECC-MAC Based on RS Code -- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks -- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools -- Role Based Access Control with Spatiotemporal Context for Mobile Applications -- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior -- A Hardware Architecture for Integrated-Security Services -- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology -- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Altri titoli varianti |
Transactions on computational science 4
Transactions on computational science four |
Record Nr. | UNISA-996465988603316 |
Berlin, : Springer-Verlag, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on computational science VI [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer, c2009 |
Descrizione fisica | 1 online resource (XII, 381 p.) |
Disciplina | 025.04 |
Altri autori (Persone) |
GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Science - Data processing
Research - Data processing Numerical calculations - Data processing Computer science Computational complexity |
Soggetto non controllato |
Science
Technology Computational Complexity Computer Science Technology & Engineering Computers |
ISBN |
1-280-38333-X
9786613561251 3-642-10649-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Information Systems and Communications -- Volterra – Lax-Wendroff Algorithm for Modelling Sea Surface Flow Pattern from Jason-1 Satellite Altimeter Data -- Guidelines for Web Usability and Accessibility on the Nintendo Wii -- Improving Urban Land Cover Classification Using Fuzzy Image Segmentation -- Connecting the Dots: Constructing Spatiotemporal Episodes from Events Schemas -- Predictive Indexing for Position Data of Moving Objects in the Real World -- SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks -- EDAS: Energy and Distance Aware Protocol Based on SPIN for Wireless Sensor Networks -- Scheme to Prevent Packet Loss during PMIPv6 Handover -- Wavelet Based Approach to Fractals and Fractal Signal Denoising -- Wavelet Analysis of Spike Train in the Fitzhugh Model -- The Design and Implementation of Secure Socket SCTP -- 2: Geographical Analysis and Geometric Modeling -- A General-Purpose Geosimulation Infrastructure for Spatial Decision Support -- Exploratory Spatial Analysis of Illegal Oil Discharges Detected off Canada’s Pacific Coast -- Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data -- Detecting Alluvial Fans Using Quantitative Roughness Characterization and Fuzzy Logic Analysis -- Evaluating the Use of Alternative Distance Metrics in Spatial Regression Analysis of Health Data: A Spatio-temporal Comparison -- Identifying Hazardous Road Locations: Hot Spots versus Hot Zones -- Geographical Analysis of Foreign Immigration and Spatial Patterns in Urban Areas: Density Estimation, Spatial Segregation and Diversity Analysis -- Geostatistics in Historical Macroseismic Data Analysis -- A Discrete Approach to Multiresolution Curves and Surfaces -- On the Structure of Straight Skeletons. |
Record Nr. | UNISA-996465930503316 |
Berlin ; ; Heidelberg, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on computational science VI [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer, c2009 |
Descrizione fisica | 1 online resource (XII, 381 p.) |
Disciplina | 025.04 |
Altri autori (Persone) |
GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Science - Data processing
Research - Data processing Numerical calculations - Data processing Computer science Computational complexity |
Soggetto non controllato |
Science
Technology Computational Complexity Computer Science Technology & Engineering Computers |
ISBN |
1-280-38333-X
9786613561251 3-642-10649-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Information Systems and Communications -- Volterra – Lax-Wendroff Algorithm for Modelling Sea Surface Flow Pattern from Jason-1 Satellite Altimeter Data -- Guidelines for Web Usability and Accessibility on the Nintendo Wii -- Improving Urban Land Cover Classification Using Fuzzy Image Segmentation -- Connecting the Dots: Constructing Spatiotemporal Episodes from Events Schemas -- Predictive Indexing for Position Data of Moving Objects in the Real World -- SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks -- EDAS: Energy and Distance Aware Protocol Based on SPIN for Wireless Sensor Networks -- Scheme to Prevent Packet Loss during PMIPv6 Handover -- Wavelet Based Approach to Fractals and Fractal Signal Denoising -- Wavelet Analysis of Spike Train in the Fitzhugh Model -- The Design and Implementation of Secure Socket SCTP -- 2: Geographical Analysis and Geometric Modeling -- A General-Purpose Geosimulation Infrastructure for Spatial Decision Support -- Exploratory Spatial Analysis of Illegal Oil Discharges Detected off Canada’s Pacific Coast -- Clustering and Hot Spot Detection in Socio-economic Spatio-temporal Data -- Detecting Alluvial Fans Using Quantitative Roughness Characterization and Fuzzy Logic Analysis -- Evaluating the Use of Alternative Distance Metrics in Spatial Regression Analysis of Health Data: A Spatio-temporal Comparison -- Identifying Hazardous Road Locations: Hot Spots versus Hot Zones -- Geographical Analysis of Foreign Immigration and Spatial Patterns in Urban Areas: Density Estimation, Spatial Segregation and Diversity Analysis -- Geostatistics in Historical Macroseismic Data Analysis -- A Discrete Approach to Multiresolution Curves and Surfaces -- On the Structure of Straight Skeletons. |
Record Nr. | UNINA-9910483003603321 |
Berlin ; ; Heidelberg, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on computational science VII [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer-Verlag, c2010 |
Descrizione fisica | 1 online resource (163 p. 73 illus.) |
Disciplina | 518 |
Altri autori (Persone) |
GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Computational complexity
Computer science Numerical calculations - Data processing Research - Data processing Science - Data processing |
Soggetto non controllato |
Science
Numerical Calculations Computer Science Computational Complexity Research Mathematics Computers Reference |
ISBN |
1-280-38545-6
9786613563378 3-642-11389-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Computations of Stochastic Systems Guest Editor: Magdy A. El-Tawil -- Mean Square Convergent Numerical Methods for Nonlinear Random Differential Equations -- A Discrete-Time Geo/G/1 Retrial Queue with Starting Failures and Impatient Customers -- Using Homotopy-WHEP Technique in Solving Nonlinear Diffusion Equation with Stochastic No Homogeneity -- Itô-Stratonovitch Formula for the Wave Equation on a Torus -- The Solution of Non-linear Diffusion Equation under Stochastic Nonhomogeneity Using Symbolic WHEP and Pickard Algorithms -- 2: Computational Methods for Complex Systems -- An Analysis of Secure Processor Architectures -- Compensation of the Scheme Dispersion and Dissipation by Artificial Non-linear Additions -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field -- Grid-Technology for Chemical Reactions Calculation -- Erratum -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field. |
Altri titoli varianti |
Transactions on computational science 7
Transactions on computational science seven |
Record Nr. | UNISA-996465303603316 |
Berlin ; ; New York, : Springer-Verlag, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on computational science VII [[electronic resource] /] / Marina L. Gavrilova, C.J. Kenneth Tan (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer-Verlag, c2010 |
Descrizione fisica | 1 online resource (163 p. 73 illus.) |
Disciplina | 518 |
Altri autori (Persone) |
GavrilovaMarina L
TanC. J. Kenneth (Chih Jeng Kenneth) |
Collana | Lecture notes in computer science |
Soggetto topico |
Computational complexity
Computer science Numerical calculations - Data processing Research - Data processing Science - Data processing |
Soggetto non controllato |
Science
Numerical Calculations Computer Science Computational Complexity Research Mathematics Computers Reference |
ISBN |
1-280-38545-6
9786613563378 3-642-11389-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Computations of Stochastic Systems Guest Editor: Magdy A. El-Tawil -- Mean Square Convergent Numerical Methods for Nonlinear Random Differential Equations -- A Discrete-Time Geo/G/1 Retrial Queue with Starting Failures and Impatient Customers -- Using Homotopy-WHEP Technique in Solving Nonlinear Diffusion Equation with Stochastic No Homogeneity -- Itô-Stratonovitch Formula for the Wave Equation on a Torus -- The Solution of Non-linear Diffusion Equation under Stochastic Nonhomogeneity Using Symbolic WHEP and Pickard Algorithms -- 2: Computational Methods for Complex Systems -- An Analysis of Secure Processor Architectures -- Compensation of the Scheme Dispersion and Dissipation by Artificial Non-linear Additions -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field -- Grid-Technology for Chemical Reactions Calculation -- Erratum -- Retracted: New Mathematical Conception and Computation Algorithm for Study of Quantum 3D Disordered Spin System under the Influence of External Field. |
Altri titoli varianti |
Transactions on computational science 7
Transactions on computational science seven |
Record Nr. | UNINA-9910483652803321 |
Berlin ; ; New York, : Springer-Verlag, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on Computational Science X [[electronic resource] ] : Special Issue on Security in Computing, Part I / / edited by Marina L. Gavrilova, C. J. Kenneth Tan |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XVIII, 366 p. 111 illus., 68 illus. in color.) |
Disciplina | 004.6 |
Collana | Transactions on Computational Science |
Soggetto topico |
Computer communication systems
Software engineering Application software Management information systems Computer science Algorithms Data encryption (Computer science) Computer Communication Networks Software Engineering Information Systems Applications (incl. Internet) Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Cryptology |
ISBN |
1-283-47736-X
9786613477361 3-642-17499-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application -- NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra -- Identity-Based Key Exchange Protocols without Pairings -- Building a Side Channel Based Disassembler -- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices -- An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD -- Trust-Based Security Level Evaluation Using Bayesian Belief Networks -- Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions -- A Weakest Precondition Approach to Robustness -- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware -- Green Secure Processors: Towards Power-Efficient Secure Processor Design -- A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token. |
Record Nr. | UNISA-996466007103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Computational Science X [[electronic resource] ] : Special Issue on Security in Computing, Part I / / edited by Marina L. Gavrilova, C. J. Kenneth Tan |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XVIII, 366 p. 111 illus., 68 illus. in color.) |
Disciplina | 004.6 |
Collana | Transactions on Computational Science |
Soggetto topico |
Computer communication systems
Software engineering Application software Management information systems Computer science Algorithms Data encryption (Computer science) Computer Communication Networks Software Engineering Information Systems Applications (incl. Internet) Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Cryptology |
ISBN |
1-283-47736-X
9786613477361 3-642-17499-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application -- NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra -- Identity-Based Key Exchange Protocols without Pairings -- Building a Side Channel Based Disassembler -- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices -- An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD -- Trust-Based Security Level Evaluation Using Bayesian Belief Networks -- Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions -- A Weakest Precondition Approach to Robustness -- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware -- Green Secure Processors: Towards Power-Efficient Secure Processor Design -- A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token. |
Record Nr. | UNINA-9910484011203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|