Transactions on Computational Science IV

Special Issue on Security in Computing

  • Marina L. Gavrilova
  • C. J. Kenneth Tan
  • Edward David Moreno

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5430)

Table of contents

  1. Front Matter
  2. Reouven Elbaz, David Champagne, Catherine Gebotys, Ruby B. Lee, Nachiketh Potlapally, Lionel Torres
    Pages 1-22
  3. Victor P. Roche, Unai Arronategui
    Pages 23-40
  4. Feng Hao, Piotr Zieliński
    Pages 41-52
  5. Emad Eldin Mohamed, Hussein Abdel-Wahab
    Pages 53-67
  6. Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson T. de Camargo, Davi da Silva Böger
    Pages 68-86
  7. Jaydeb Bhaumik, Dipanwita Roy Chowdhury
    Pages 117-135
  8. Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham
    Pages 136-148
  9. Subhendu Aich, Samrat Mondal, Shamik Sural, Arun Kumar Majumdar
    Pages 177-199
  10. Fábio Dacêncio Pereira, Edward David Moreno Ordonez
    Pages 215-229
  11. Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti et al.
    Pages 230-243
  12. Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su et al.
    Pages 244-262
  13. Back Matter

About this book


The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.

This issue focuses on the theme of security in computing, a topic of vital importance in the increasingly connected world of today. The 14 extensive papers selected for inclusion in this volume give an in-depth coverage of a number of hot topics in the field, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.


Error-correcting Code FPGA performance Information Performance Service Oriented Architecture (SOA) algorithm algorithms anonymous veto clustering communication communication interfaces embedded security systems error correcting code hardware integrity security

Editors and affiliations

  • Marina L. Gavrilova
    • 1
  • C. J. Kenneth Tan
    • 2
  • Edward David Moreno
    • 3
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.OptimaNumerics Ltd.BelfastUK
  3. 3.University of Amazonas State - UEA ManausBrazil

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-01003-3
  • Online ISBN 978-3-642-01004-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment