© 2010

Transactions on Computational Science XI

Special Issue on Security in Computing, Part II

  • Marina L. Gavrilova
  • C. J. Kenneth Tan
  • Edward David Moreno
  • Contains detailed papers on up-to-date topics in cryptography

  • Gives a thorough coverage of the vital area of information security

  • Includes an Editorial by the Guest Editor giving a concise but informative introduction to each paper


Part of the Lecture Notes in Computer Science book series (LNCS, volume 6480)

Table of contents

  1. Front Matter
  2. Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, Christian Wachsmann
    Pages 39-63
  3. Ricardo José Menezes Maia, Paulo Sérgio Licciardi Messeder Barreto, Bruno Trevizan de Oliveira
    Pages 64-78
  4. Owen Harrison, John Waldron
    Pages 104-130
  5. Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard
    Pages 131-161
  6. Fábio Dacêncio Pereira, Edward David Moreno
    Pages 162-178
  7. André Proto, Leandro A. Alexandre, Maira L. Batista, Isabela L. Oliveira, Adriano M. Cansian
    Pages 179-191
  8. Feng Hao, Peter Ryan
    Pages 192-206
  9. P. T. V. Bhuvaneswari, V. Vaidehi, M. Agnes Saranya
    Pages 207-222
  10. Paul Nicholl, Afandi Ahmad, Abbes Amira
    Pages 223-248
  11. Heidar Pirzadeh, Danny Dubé, Abdelwahab Hamou-Lhadj
    Pages 249-269
  12. S. S. Bedi, Shekhar Verma, Geetam S. Tomar
    Pages 270-292
  13. Back Matter

About this book


The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 11th issue of the Transactions on Computational Science journal, edited by Edward David Moreno, is the second of two publications focusing on security in computing. The 14 papers in the volume address a wide range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.


CUDA GPU acceleration RFID cryptographic protocols elliptic curve cryptography privacy wireless mesh networks wireless sensor networks

Editors and affiliations

  • Marina L. Gavrilova
    • 1
  • C. J. Kenneth Tan
    • 2
  • Edward David Moreno
    • 3
  1. 1.Department of Computer ScienceUniversity of Calgary CalgaryCanada
  2. 2.Exascala Ltd. BirminghamUK
  3. 3.DCOMP/UFS - Federal University of Sergipe AracajuBrazil

Bibliographic information

Industry Sectors
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences