Atjaunināt sīkdatņu piekrišanu

Computation, Cryptography, and Network Security 1st ed. 2015 [Hardback]

  • Formāts: Hardback, 756 pages, height x width: 235x155 mm, 46 Illustrations, color; 65 Illustrations, black and white; IX, 756 p. 111 illus., 46 illus. in color., 1 Hardback
  • Izdošanas datums: 28-Sep-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319182749
  • ISBN-13: 9783319182742
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 756 pages, height x width: 235x155 mm, 46 Illustrations, color; 65 Illustrations, black and white; IX, 756 p. 111 illus., 46 illus. in color., 1 Hardback
  • Izdošanas datums: 28-Sep-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319182749
  • ISBN-13: 9783319182742
Citas grāmatas par šo tēmu:

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.

This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.

Recenzijas

The stated audience for the book includes academicians, decision makers, engineers, experts in the field of operations research, the armed forces, and practitioners. The book is very specialized and mathematically sophisticated . A number of practical applications are considered in the book. The publication of the book is timely and the topics in the book are of current interest. I strongly recommend this book for its intended audience. (S. V. Nagaraj, Computing Reviews, April, 2016)

Transformations of Cryptographic Schemes Through Interpolation Techniques
1(18)
Stamatios-Aggelos N. Alexandropoulos
Gerasimos C. Meletiou
Dimitrios S. Triantafyllou
Michael N. Vrahatis
Flaws in the Initialisation Process of Stream Ciphers
19(32)
Ali Alhamdan
Harry Bartlett
Ed Dawson
Leonie Simpson
Kenneth Koon-Ho Wong
Producing Fuzzy Inclusion and Entropy Measures
51(24)
Athanasios C. Bogiatzis
Basil K. Papadopoulos
On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses
75(28)
Kenier Castillo
Francisco Marcellan
On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Study
103(20)
Jinda Cui
Hsiao-Dong Chiang
Tao Wang
Security and Formation of Network-Centric Operations
123(38)
Nicholas J. Daras
A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security
161(34)
Konstantinos Demertzis
Lazaros Iliadis
Integral Estimates for the Composition of Green's and Bounded Operators
195(14)
Shusen Ding
Yuming Xing
A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory
209(44)
S.S. Dragomir
On Geometry of the Zeros of a Polynomial
253(36)
N.K. Govil
Eze R. Nwaeze
Approximation by Durrmeyer Type Operators Preserving Linear Functions
289(10)
Vijay Gupta
Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves
299(20)
Elisavet Konstantinou
Aristides Kontogeorgis
Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces
319(12)
Jichang Kuang
Threshold Secret Sharing Through Multivariate Birkhoff Interpolation
331(20)
Vasileios E. Markoutis
Gerasimos C. Meletiou
Aphrodite N. Veneti
Michael N. Vrahatis
Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants
351(30)
Theodosis Mourouzis
Nicolas Courtois
A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
381(18)
Anna Nagurney
Ladimer S. Nagurney
Shivani Shukla
A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies
399(14)
Panayotis E. Nastou
Dimitra Nastouli
Panos M. Pardalos
Yannis C. Stamatiou
Quantum Analogues of Hermite-Hadamard Type Inequalities for Generalized Convexity
413(28)
Muhammad Aslam Noor
Khalida Inayat Noor
Muhammad Uzair Awan
A Digital Signature Scheme Based on Two Hard Problems
441(10)
Dimitrios Poulakis
Robert Rolland
Randomness in Cryptography
451(10)
Robert Rolland
Current Challenges for IT Security with Focus on Biometry
461(32)
Benjamin Tams
Michael Th. Rassias
Preda Mihailescu
Generalizations of Entropy and Information Measures
493(32)
Thomas L. Toulias
Christos P. Kitsos
Maximal and Variational Principles in Vector Spaces
525(52)
Mihai Turinici
All Functions g:N → N Which have a Single-Fold Diophantine Representation are Dominated by a Limit-Computable Function f:N \ {0} → N Which is Implemented in MuPAD and Whose Computability is an Open Problem
577(14)
Apoloniusz Tyszka
Image Encryption Scheme Based on Non-autonomous Chaotic Systems
591(22)
Christos K. Volos
Ioannis M. Kyprianidis
Ioannis Stouboulos
Viet-Thanh Pham
Multiple Parameterize Yang-Hilbert-Type Integral Inequalities
613(22)
Bicheng Yang
Parameterized Yang-Hilbert-Type Integral Inequalities and Their Operator Expressions
635(102)
Bicheng Yang
Michael Th. Rassias
A Secure Communication Design Based on the Chaotic Logistic Map: An Experimental Realization Using Arduino Microcontrollers
737
Mauricio Zapateiro De la Hoz
Leonardo Acho
Yolanda Vidal