E-Book, Englisch, 263 Seiten, eBook
Transactions on Computational Science IV
2009
ISBN: 978-3-642-01004-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Special Issue on Security in Computing
E-Book, Englisch, 263 Seiten, eBook
Reihe: Transactions on Computational Science
ISBN: 978-3-642-01004-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Weitere Infos & Material
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.- Behavioural Characterization for Network Anomaly Detection.- The Power of Anonymous Veto in Public Discussion.- Collusion-Resistant Message Authentication in Overlay Multicast Communication.- A Model for Authentication Credentials Translation in Service Oriented Architecture.- Secure and Efficient Group Key Agreements for Cluster Based Networks.- An Integrated ECC-MAC Based on RS Code.- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks.- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools.- Role Based Access Control with Spatiotemporal Context for Mobile Applications.- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.- A Hardware Architecture for Integrated-Security Services.- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.