1 option
Horizons in computer science research. Volume 10 / Thomas S. Clary, editor.
- Format:
- Book
- Series:
- Horizons in Computer Science (NOT ON COVER)
- Horizons in Computer Science
- Language:
- English
- Subjects (All):
- Computer science--Research.
- Computer science.
- Physical Description:
- 1 online resource (164 p.)
- Place of Publication:
- New York : Nova Publishers, 2015.
- Language Note:
- English
- Summary:
- This book presents original results on the leading edge of computer science research. Each article has been carefully selected in an attempt to present substantial research results across a broad spectrum. Topics discussed include telecommunication network security; application of cloud computing in preclinical radiation treatment planning; computational cryptography based on phase encoding and intensity pattern superposition via optics theory; an agent-based optimized cloud service discovery system; computing network reliability with diameter constraints; a survey on the open source tools for
- Contents:
- ""HORIZONS IN COMPUTER SCIENCE RESEARCH. VOLUME 10""; ""HORIZONS IN COMPUTER SCIENCE RESEARCH. VOLUME 10""; ""Library of Congress Cataloging-in-Publication Data""; ""Contents""; ""Preface""; ""Chapter 1: Telecommunication Network Security""; ""1. Introduction""; ""2. Conceptual clarifications on Security in Telecommunications and Information Technology""; ""2.1. Basic Security Architecture and Dimensions""; ""3. The Context of Security and the Threat-Scape in Cyber Warfare""; ""3.1. Security Concepts""; ""3.2. Security Engineering in Context""; ""3.3. A Brief Overview of Cryptology""
- ""3.3.1. Context of Cryptography""""3.3.2. General Model of Cryptosystems""; ""3.3.3. Cryptanalysis""; ""3.4. Social Engineering""; ""3.5. Distributed Denial of Service Attack""; ""Illustration""; ""3.6. IP Trace-Back Mechanism""; ""3.7. The Threat-Scape in Cyber Warfare""; ""3.7.1. The Concepts of Cyber and Cyberspace""; ""3.8. Deductions""; ""4. Telecommunications System Security Requirements""; ""4.1. Technical Threats to Communication Security""; ""4.2. Countermeasures against Threats to Communication Security""
- ""4.3. Cryptographic Solutions for the Technical Threats to Communication Security""""4.3.1. Confidentiality""; ""4.3.2. Integrity""; ""4.3.3. Availability""; ""4.3.4. Authentication""; ""4.3.4.1. Text and Data Message Authentication""; ""4.3.5. Digital Signatures""; ""4.3.6. Key Management""; ""4.4. PINs, Passwords and Password Security Purgatory""; ""4.4.1. Definition and Significance""; ""4.4.2. Factors in the Security of a Password System""; ""4.4.3. Security Guidelines on Password Usage""; ""4.4.3.1. Guidelines for Strong Passwords""; ""4.4.4. Password Security versus Human Factors""
- ""4.4.5. Training and Security Awareness Education""""4.4.6. Deductions""; ""5. Location Based Authentication""; ""5.1. GPS Capability and Location Based Authentication""; ""6. Future Projections""; ""Conclusion""; ""Acknowledgments""; ""References""; ""Chapter 2: Application of Cloud Computing in Preclinical Radiation Treatment Planning""; ""Abstract""; ""1. Introduction""; ""2. Preclinical Treatment Planning System""; ""2.1. Basic Concept""; ""2.2. Computer Graphical Interface""; ""2.3. The DOSCTP Treatment Planning System""; ""2.3.1. Program Flow of the DOSCTP""
- ""2.3.2. Front-End Window of the DOSCTP""""2.3.3. Validation of the DOSCTP""; ""3. Cloud Computing""; ""3.1. Basic Concept""; ""3.2. Cloud Computing Services""; ""3.3. Private and Public Cloud""; ""3.4. High Performance Computing Cloud""; ""4. Preclinical Treatment Planning on Cloud Computing""; ""5. Evaluation of the Cloud Computing Efficiency""; ""Conclusion""; ""Acknowledgments""; ""References""; ""Chapter 3: Computational Cryptography Based on Phase Encoding and Intensity Pattern Superposition via Optics Theory""; ""Abstract""; ""1. Introduction""; ""2. Encription Basic Theory""
- ""3. Encryption and Decryption via Random Pattern""
- Notes:
- Description based upon print version of record.
- Includes bibliographical references at the end of each chapters and index.
- Description based on print version record.
- ISBN:
- 1-63463-773-9
- OCLC:
- 904249256
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.