Items related to Transactions on Computational Science IV (Lecture Notes...

Transactions on Computational Science IV (Lecture Notes in Computer Science / Transactions on Computational Science): Special Issue on Security in ... (Lecture Notes in Computer Science, 5430) - Softcover

 
9783642010033: Transactions on Computational Science IV (Lecture Notes in Computer Science / Transactions on Computational Science): Special Issue on Security in ... (Lecture Notes in Computer Science, 5430)

Synopsis

In the second contribution, entitled "Behavioral Characterization for Network Anomaly Detection," Victor P. Roche and Unai Arronategui propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the obser- tion of the behavior of different elements at the network edges. This methodology means an advance in the detection of a new infection in the backbone of the network, but also in the identification of the infected hosts of a specific network. The authors try to detect network anomalies by tracking the behavior of different network levels. This proposed method is not based on intrinsic characteristics of the worm but on their manner of acting. This methodology has proved its effectiveness in real infections caused by viruses such as SpyBot and Agobot in accordance with experimental tests. In the third contribution, which is entitled "The Power of Anonymous Veto in Public Discussion," Feng Hao and Piotr Zielinski propose an exceptional solution--Anonymous Veto Network (or AV-net)--to allow a group of participants to compute a boolean-OR function securely. This protocol is provably secure under the Decision Diffie-Hellman (DDH) and random oracle assumptions.

"synopsis" may belong to another edition of this title.

From the Back Cover

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.

This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14 extensive papers selected for inclusion in this volume give an in-depth coverage of a number of hot topics in the field, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.

"About this title" may belong to another edition of this title.

Buy Used

Condition: Fine
Zustand: Sehr gut | Seiten: 284...
View this item

£ 7.68 shipping from Germany to United Kingdom

Destination, rates & speeds

Buy New

View this item

£ 2.49 shipping within United Kingdom

Destination, rates & speeds

Search results for Transactions on Computational Science IV (Lecture Notes...

Stock Image

Unbekannt
Published by Springer Berlin Heidelberg, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
Used Softcover

Seller: Buchpark, Trebbin, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Sehr gut. Zustand: Sehr gut | Seiten: 284 | Sprache: Englisch | Produktart: Bücher. Seller Inventory # 5207622/12

Contact seller

Buy Used

£ 37.49
Convert currency
Shipping: £ 7.68
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

C. J. Kenneth Tan
Published by Springer 2009-04-22, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Paperback

Seller: Chiron Media, Wallingford, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: New. Seller Inventory # 6666-IUK-9783642010033

Contact seller

Buy New

£ 47.76
Convert currency
Shipping: £ 2.49
Within United Kingdom
Destination, rates & speeds

Quantity: 10 available

Add to basket

Stock Image

Published by Springer, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Softcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9783642010033_new

Contact seller

Buy New

£ 50.82
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

ISBN 10: 3642010032 ISBN 13: 9783642010033
New Taschenbuch
Print on Demand

Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14extensive papers selected for inclusion in this volumegive an in-depth coverageof a number of hot topics in the field,presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications. 284 pp. Englisch. Seller Inventory # 9783642010033

Contact seller

Buy New

£ 47.53
Convert currency
Shipping: £ 9.49
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Published by Springer Berlin Heidelberg, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Taschenbuch

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14extensive papers selected for inclusion in this volumegive an in-depth coverageof a number of hot topics in the field,presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications. Seller Inventory # 9783642010033

Contact seller

Buy New

£ 47.53
Convert currency
Shipping: £ 12.07
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Tan, C. J. Kenneth
Published by Springer Berlin Heidelberg, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Softcover
Print on Demand

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.- Behavioural Characterization for Network Anomaly Detection.- The Power of Anonymous Veto in Public Discussion.- Collusion-Resistant Message Authentication in Overla. Seller Inventory # 5043255

Contact seller

Buy New

£ 42.98
Convert currency
Shipping: £ 21.56
From Germany to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Published by Springer, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Softcover
Print on Demand

Seller: Majestic Books, Hounslow, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Print on Demand pp. 284 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Seller Inventory # 5844638

Contact seller

Buy New

£ 67.45
Convert currency
Shipping: £ 3.35
Within United Kingdom
Destination, rates & speeds

Quantity: 4 available

Add to basket

Stock Image

Tan, C. J. Kenneth (Editor)
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Paperback

Seller: Revaluation Books, Exeter, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Brand New. 1st edition. 263 pages. 9.21x6.06x0.63 inches. In Stock. Seller Inventory # x-3642010032

Contact seller

Buy New

£ 65.06
Convert currency
Shipping: £ 6.99
Within United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Published by Springer, 2009
ISBN 10: 3642010032 ISBN 13: 9783642010033
New Softcover

Seller: Books Puddle, New York, NY, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Condition: New. pp. 284. Seller Inventory # 263051841

Contact seller

Buy New

£ 66.70
Convert currency
Shipping: £ 6.59
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 4 available

Add to basket

Seller Image

ISBN 10: 3642010032 ISBN 13: 9783642010033
New Taschenbuch

Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. Neuware -In the second contribution, entitled ¿Behavioral Characterization for Network Anomaly Detection,¿ Victor P. Roche and Unai Arronategui propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the obser- tion of the behavior of different elements at the network edges. This methodology means an advance in the detection of a new infection in the backbone of the network, but also in the identification of the infected hosts of a specific network. The authors try to detect network anomalies by tracking the behavior of different network levels. This proposed method is not based on intrinsic characteristics of the worm but on their manner of acting. This methodology has proved its effectiveness in real infections caused by viruses such as SpyBot and Agobot in accordance with experimental tests. In the third contribution, which is entitled ¿The Power of Anonymous Veto in Public Discussion,¿ Feng Hao and Piotr Zielinski propose an exceptional solution¿¿Anonymous Veto Network (or AV-net)¿¿to allow a group of participants to compute a boolean-OR function securely. This protocol is provably secure under the Decision Diffie-Hellman (DDH) and random oracle assumptions.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 284 pp. Englisch. Seller Inventory # 9783642010033

Contact seller

Buy New

£ 47.53
Convert currency
Shipping: £ 30.20
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

There are 3 more copies of this book

View all search results for this book