語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computation, Cryptography, and Netwo...
~
Daras, Nicholas J.
Computation, Cryptography, and Network Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Computation, Cryptography, and Network Security/ edited by Nicholas J. Daras, Michael Th. Rassias.
其他作者:
Daras, Nicholas J.
面頁冊數:
IX, 756 p. 111 illus., 46 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Algebra. -
電子資源:
https://doi.org/10.1007/978-3-319-18275-9
ISBN:
9783319182759
Computation, Cryptography, and Network Security
Computation, Cryptography, and Network Security
[electronic resource] /edited by Nicholas J. Daras, Michael Th. Rassias. - 1st ed. 2015. - IX, 756 p. 111 illus., 46 illus. in color.online resource.
Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang–Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang–Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal).
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis. .
ISBN: 9783319182759
Standard No.: 10.1007/978-3-319-18275-9doiSubjects--Topical Terms:
579870
Algebra.
LC Class. No.: QA172-172.4
Dewey Class. No.: 511.33
Computation, Cryptography, and Network Security
LDR
:05147nam a22004095i 4500
001
960993
003
DE-He213
005
20200701104722.0
007
cr nn 008mamaa
008
201211s2015 gw | s |||| 0|eng d
020
$a
9783319182759
$9
978-3-319-18275-9
024
7
$a
10.1007/978-3-319-18275-9
$2
doi
035
$a
978-3-319-18275-9
050
4
$a
QA172-172.4
050
4
$a
QA171.5
072
7
$a
PBF
$2
bicssc
072
7
$a
MAT002010
$2
bisacsh
072
7
$a
PBF
$2
thema
082
0 4
$a
511.33
$2
23
245
1 0
$a
Computation, Cryptography, and Network Security
$h
[electronic resource] /
$c
edited by Nicholas J. Daras, Michael Th. Rassias.
250
$a
1st ed. 2015.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
IX, 756 p. 111 illus., 46 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang–Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang–Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal).
520
$a
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis. .
650
0
$a
Algebra.
$2
gtt
$3
579870
650
0
$a
Ordered algebraic structures.
$3
672366
650
0
$a
Number theory.
$3
527883
650
0
$a
Coding theory.
$3
561460
650
0
$a
Information theory.
$3
595305
650
0
$a
Approximation theory.
$3
527707
650
0
$a
Computer organization.
$3
596298
650
0
$a
Operations research.
$3
573517
650
0
$a
Management science.
$3
719678
650
1 4
$a
Order, Lattices, Ordered Algebraic Structures.
$3
670104
650
2 4
$a
Number Theory.
$3
672023
650
2 4
$a
Coding and Information Theory.
$3
669784
650
2 4
$a
Approximations and Expansions.
$3
672153
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Operations Research, Management Science.
$3
785065
700
1
$a
Daras, Nicholas J.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
883697
700
1
$a
Rassias, Michael Th.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
783127
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319182742
776
0 8
$i
Printed edition:
$z
9783319182766
776
0 8
$i
Printed edition:
$z
9783319372631
856
4 0
$u
https://doi.org/10.1007/978-3-319-18275-9
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入