The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 10th issue of the Transactions on Computational Science, edited by Edward David Moreno, is the first of two publications focusing on security in computing. The 14 papers included in the volume address a wide range of applications and designs, such as new architectures, novel hardware implementations, cryptographic algorithms, and security protocols.
Author(s): Luca Compagna, Paul El Khoury, Fabio Massacci (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Series: Lecture Notes in Computer Science 6340 : Transactions on Computational Science
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 366
Tags: Computer Communication Networks; Software Engineering; Information Systems Applications (incl.Internet); Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Data Encryption
Front Matter....Pages -
A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application....Pages 1-24
NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra....Pages 25-41
Identity-Based Key Exchange Protocols without Pairings....Pages 42-77
Building a Side Channel Based Disassembler....Pages 78-99
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices....Pages 100-130
An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD....Pages 131-153
Trust-Based Security Level Evaluation Using Bayesian Belief Networks....Pages 154-186
Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection....Pages 187-201
Signcryption with Non-interactive Non-repudiation without Random Oracles....Pages 202-230
Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions....Pages 231-260
A Weakest Precondition Approach to Robustness....Pages 261-297
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware....Pages 298-328
Green Secure Processors: Towards Power-Efficient Secure Processor Design....Pages 329-351
A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token....Pages 352-363
Back Matter....Pages -