Eintrag weiter verarbeiten

Transactions on Computational Science XI: Special Issue on Security in Computing, Part II

Gespeichert in:

Personen und Körperschaften: Gavrilova, Marina L. (VerfasserIn), Tan, C. J. Kenneth (Sonstige), Moreno, Edward David (Sonstige)
Titel: Transactions on Computational Science XI: Special Issue on Security in Computing, Part II/ edited by Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno
Format: E-Book
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6480
Schlagwörter:
Buchausg. u.d.T.: Transactions on computational science ; 11: Special issue on security in computing, Berlin : Springer, 2010, XVIII, 294 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
Details
Zusammenfassung: The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 11th issue of the Transactions on Computational Science journal, edited by Edward David Moreno, is the second of two publications focusing on security in computing. The 14 papers in the volume address a wide range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.
Umfang: Online-Ressource (XVIII, 294p, digital)
ISBN: 9783642176975
DOI: 10.1007/978-3-642-17697-5