Computation, cryptography, and network security:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2015]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | ix, 756 Seiten Illustrationen, Diagramme (teilweise farbig) |
ISBN: | 9783319182759 3319182757 9783319182742 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043026199 | ||
003 | DE-604 | ||
005 | 20170224 | ||
007 | t | ||
008 | 151120s2015 a||| |||| 00||| eng d | ||
020 | |a 9783319182759 |c eBook |9 978-3-319-18275-9 | ||
020 | |a 3319182757 |9 3-319-18275-7 | ||
020 | |a 9783319182742 |c hbk. |9 978-3-319-18274-2 | ||
035 | |a (OCoLC)932047359 | ||
035 | |a (DE-599)BVBBV043026199 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-355 |a DE-83 | ||
082 | 0 | |a 511.33 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 94A30 |2 msc | ||
084 | |a 94-06 |2 msc | ||
084 | |a 68M10 |2 msc | ||
084 | |a 94A60 |2 msc | ||
245 | 1 | 0 | |a Computation, cryptography, and network security |c Nicholas J. Daras, Michael Th. Rassias, editors |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2015] | |
300 | |a ix, 756 Seiten |b Illustrationen, Diagramme (teilweise farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Engineering mathematics | |
650 | 4 | |a Computer networks / Security measures / Mathematical models | |
650 | 4 | |a Mathematics | |
650 | 7 | |a MATHEMATICS / Essays |2 bisacsh | |
650 | 7 | |a MATHEMATICS / Pre-Calculus |2 bisacsh | |
650 | 7 | |a MATHEMATICS / Reference |2 bisacsh | |
650 | 4 | |a Mathematik | |
650 | 4 | |a Mathematisches Modell | |
700 | 1 | |a Daras, Nicholas J. |0 (DE-588)1088801757 |4 edt | |
700 | 1 | |a Rassias, Michael Th. |d 1987- |0 (DE-588)1054967091 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o 10.1007/978-3-319-18274-2 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028450874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028450874 |
Datensatz im Suchindex
_version_ | 1804175379556990976 |
---|---|
adam_text | Contents
Transformations of Cryptographie Schemes Through
Interpolation Techniques............................................ 1
Stamatios-Aggelos N. Alexandropoulos, Gerasimos C. Meletiou,
Dimitrios S. Triantafyllou, and Michael N. Vrahatis
Flaws in the Initialisation Process of Stream Ciphers............... 19
Ali Alhamdan, Harry Bartlett, Ed Dawson, Leonie Simpson,
and Kenneth Koon-Ho Wong
Producing Fuzzy Inclusion and Entropy Measures...................... 51
Athanasios C. Bogiatzis and Basil K. Papadopoulos
On Some Recent Results on Asymptotic Behavior of
Orthogonal Polynomials on the Unit Circle and Inserting
Point Masses.......................................................... 75
Kenier Castillo and Francisco Marcellân
On the Unstable Equilibrium Points and System Separations
in Electric Power Systems: A Numerical Study......................... 103
Jinda Cui, Hsiao-Dong Chiang, and Tao Wang
Security and Formation of Network-Centric Operations................. 123
Nicholas J. Daras
A Bio-Inspired Hybrid Artificial Intelligence Framework for
Cyber Security....................................................... 161
Konstantinos Demertzis and Lazaros Iliadis
Integral Estimates for the Composition of Green’s and
Bounded Operators.................................................... 195
Shusen Ding and Yuming Xing
A Survey of Reverse Inequalities for ƒ-Divergence Measure
in Information Theory................................................ 209
S.S. Dragomir
vii
Contents
viii
On Geometry of the Zeros of a Polynomial............................ 253
N.K. Govil and Eze R. Nwaeze
Approximation by Durrmeyer Type Operators Preserving
Linear Functions ................................................... 289
Vijay Gupta
Revisiting the Complex Multiplication Method for the
Construction of Elliptic Curves...................................... 299
Elisavet Konstantinou and Aristides Kontogeorgis
Generalized Laplace Transform Inequalities in Multiple
Weighted Orlicz Spaces............................................... 319
Jichang Kuang
Threshold Secret Sharing Through Multivariate Birkhoff
Interpolation........................................................ 331
Vasileios E. Markoutis, Gerasimos C. Meletiou,
Aphrodite N. Veneti, and Michael N. Vrahatis
Advanced Truncated Differential Attacks Against GOST
Block Cipher and Its Variants........................................ 351
Theodosis Mourouzis and Nicolas Courtois
A Supply Chain Game Theory Framework for Cybersecurity
Investments Under Network Vulnerability.............................. 381
Anna Nagurney, Ladimer S. Nagurney, and Shivani Shukla
A Method for Creating Private and Anonymous Digital
Territories Using Attribute-Based Credential Technologies............ 399
Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos,
and Yannis C. Stamatiou
Quantum Analogues of Hermite—Hadamard Type Inequalities
for Generalized Convexity ......................................... 413
Muhammad Aslam Noor, Khalida Inayat Noor,
and Muhammad Uzair Awan
A Digital Signature Scheme Based on Two Hard Problems............... 441
Dimitrios Poulakis and Robert Rolland
Randomness in Cryptography........................................... 451
Robert Rolland
Current Challenges for IT Security with Focus on Biometry........... 461
Benjamin Tams, Michael Th. Rassias, and Preda Mihailescu
Generalizations of Entropy and Information Measures.................. 493
Thomas L. Toulias and Christos P. Kitsos
Contents ix
Maximal and Variational Principles in Vector Spaces................ 525
Mihai Turinici
All Functions g:N N Which have a Single-Fold Diophantine
Representation are Dominated by a Limit-Computable
Function ƒ :N {0} N Which is Implemented in MuPAD
and Whose Computability is an Open Problem.......................... 577
Apoloniusz Tyszka
Image Encryption Scheme Based on Non-autonomous Chaotic
Systems............................................................. 591
Christos K. Volos, Ioannis M. Kyprianidis, Ioannis Stouboulos,
and Viet-Thanh Pham
Multiple Parameterize Yang-Hilbert-Type Integral Inequalities....... 613
Bicheng Yang
Parameterized Yang-Hilbert-Type Integral Inequalities and
Their Operator Expressions.......................................... 635
Bicheng Yang and Michael Th. Rassias
A Secure Communication Design Based on the Chaotic
Logistic Map: An Experimental Realization Using Arduino
Microcontrollers.................................................. 737
Mauricio Zapateiro De la Hoz, Leonardo Acho, and Yolanda Vidal
|
any_adam_object | 1 |
author2 | Daras, Nicholas J. Rassias, Michael Th. 1987- |
author2_role | edt edt |
author2_variant | n j d nj njd m t r mt mtr |
author_GND | (DE-588)1088801757 (DE-588)1054967091 |
author_facet | Daras, Nicholas J. Rassias, Michael Th. 1987- |
building | Verbundindex |
bvnumber | BV043026199 |
classification_rvk | ST 200 ST 276 |
ctrlnum | (OCoLC)932047359 (DE-599)BVBBV043026199 |
dewey-full | 511.33 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 511 - General principles of mathematics |
dewey-raw | 511.33 |
dewey-search | 511.33 |
dewey-sort | 3511.33 |
dewey-tens | 510 - Mathematics |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01970nam a2200493 c 4500</leader><controlfield tag="001">BV043026199</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170224 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">151120s2015 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319182759</subfield><subfield code="c">eBook</subfield><subfield code="9">978-3-319-18275-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319182757</subfield><subfield code="9">3-319-18275-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319182742</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-3-319-18274-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932047359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043026199</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">511.33</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A30</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94-06</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68M10</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computation, cryptography, and network security</subfield><subfield code="c">Nicholas J. Daras, Michael Th. Rassias, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ix, 756 Seiten</subfield><subfield code="b">Illustrationen, Diagramme (teilweise farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Mathematical models</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MATHEMATICS / Essays</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MATHEMATICS / Pre-Calculus</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MATHEMATICS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematisches Modell</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Daras, Nicholas J.</subfield><subfield code="0">(DE-588)1088801757</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rassias, Michael Th.</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1054967091</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">10.1007/978-3-319-18274-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028450874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028450874</subfield></datafield></record></collection> |
id | DE-604.BV043026199 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:15:21Z |
institution | BVB |
isbn | 9783319182759 3319182757 9783319182742 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028450874 |
oclc_num | 932047359 |
open_access_boolean | |
owner | DE-11 DE-355 DE-BY-UBR DE-83 |
owner_facet | DE-11 DE-355 DE-BY-UBR DE-83 |
physical | ix, 756 Seiten Illustrationen, Diagramme (teilweise farbig) |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
spelling | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors Cham ; Heidelberg ; New York ; Dordrecht ; London Springer [2015] ix, 756 Seiten Illustrationen, Diagramme (teilweise farbig) txt rdacontent n rdamedia nc rdacarrier Engineering mathematics Computer networks / Security measures / Mathematical models Mathematics MATHEMATICS / Essays bisacsh MATHEMATICS / Pre-Calculus bisacsh MATHEMATICS / Reference bisacsh Mathematik Mathematisches Modell Daras, Nicholas J. (DE-588)1088801757 edt Rassias, Michael Th. 1987- (DE-588)1054967091 edt Erscheint auch als Online-Ausgabe 10.1007/978-3-319-18274-2 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028450874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computation, cryptography, and network security Engineering mathematics Computer networks / Security measures / Mathematical models Mathematics MATHEMATICS / Essays bisacsh MATHEMATICS / Pre-Calculus bisacsh MATHEMATICS / Reference bisacsh Mathematik Mathematisches Modell |
title | Computation, cryptography, and network security |
title_auth | Computation, cryptography, and network security |
title_exact_search | Computation, cryptography, and network security |
title_full | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors |
title_fullStr | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors |
title_full_unstemmed | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors |
title_short | Computation, cryptography, and network security |
title_sort | computation cryptography and network security |
topic | Engineering mathematics Computer networks / Security measures / Mathematical models Mathematics MATHEMATICS / Essays bisacsh MATHEMATICS / Pre-Calculus bisacsh MATHEMATICS / Reference bisacsh Mathematik Mathematisches Modell |
topic_facet | Engineering mathematics Computer networks / Security measures / Mathematical models Mathematics MATHEMATICS / Essays MATHEMATICS / Pre-Calculus MATHEMATICS / Reference Mathematik Mathematisches Modell |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028450874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT darasnicholasj computationcryptographyandnetworksecurity AT rassiasmichaelth computationcryptographyandnetworksecurity |