Computation, Cryptography, and Network Security - Rilegato

9783319182742: Computation, Cryptography, and Network Security
Vedi tutte le copie di questo ISBN:
 
 

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.

This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Recensione:

“The stated audience for the book includes academicians, decision makers, engineers, experts in the field of operations research, the armed forces, and practitioners. ... The book is very specialized and mathematically sophisticated ... . A number of practical applications are considered in the book. ... The publication of the book is timely and the topics in the book are of current interest. ... I strongly recommend this book for its intended audience.” (S. V. Nagaraj, Computing Reviews, April, 2016)

Contenuti:

Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis).- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong).- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos).- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán).- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang).- Security and Formation of Network-Centric Operations (N.J. Daras).- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis).- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing).- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir).- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze).- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta).- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis).- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang).- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis).- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois).- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla).- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou).- Quantam Analogues of Hermite–Hadamard Type Inequalities for Generalized Convexity (M.A. Noor, K.I. Noor, M.U. Awan).- A Digital Signature Scheme Based on Two Hard Problems (D. Poulakis, R. Rolland).- Randomness in Cryptography (R. Rolland).- Current Challenges for IT Security with Focus on Biometry (B. Tams, M.Th. Rassias, P. Mihăilescu).- Generalizations of Entropy and Information Measures (T.L. Toulias, C.P. Kitsos).- Maximal and Variational Principles in Vector Spaces (M. Turinici).- All Functions g: N->N Which Have a Single-Fold Diophantine Representation are Dominated by a Limit-Computable Function f: N\{0}->N Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka).- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham).- Multiple Parameterized Yang–Hilbert-Type Integral Inequalities (B. Yang).- Parameterized Yang–Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias).- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal).

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Spese di spedizione: EUR 23,00
Da: Germania a: U.S.A.

Destinazione, tempi e costi

Aggiungere al carrello

Altre edizioni note dello stesso titolo

9783319372631: Computation, Cryptography, and Network Security

Edizione in evidenza

ISBN 10:  3319372637 ISBN 13:  9783319372631
Casa editrice: Springer Nature, 2016
Brossura

I migliori risultati di ricerca su AbeBooks

Immagini fornite dal venditore

Michael Th. Rassias
ISBN 10: 3319182749 ISBN 13: 9783319182742
Nuovo Rilegato Quantità: 2
Print on Demand
Da:
BuchWeltWeit Ludwig Meier e.K.
(Bergisch Gladbach, Germania)
Valutazione libreria

Descrizione libro Buch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current 'state-of-the-art,' and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis. 768 pp. Englisch. Codice articolo 9783319182742

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 106,99
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 23,00
Da: Germania a: U.S.A.
Destinazione, tempi e costi
Immagini fornite dal venditore

Daras, Nicholas J.|Rassias, Michael Th.
ISBN 10: 3319182749 ISBN 13: 9783319182742
Nuovo Rilegato Quantità: > 20
Da:
moluna
(Greven, Germania)
Valutazione libreria

Descrizione libro Gebunden. Condizione: New. Codice articolo 32576242

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 92,27
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 48,99
Da: Germania a: U.S.A.
Destinazione, tempi e costi
Immagini fornite dal venditore

Michael Th. Rassias
ISBN 10: 3319182749 ISBN 13: 9783319182742
Nuovo Rilegato Quantità: 1
Da:
AHA-BUCH GmbH
(Einbeck, Germania)
Valutazione libreria

Descrizione libro Buch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current 'state-of-the-art,' and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis. Codice articolo 9783319182742

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 111,86
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 32,99
Da: Germania a: U.S.A.
Destinazione, tempi e costi