Computation, cryptography, and network security:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2015]
|
Schlagworte: | |
Online-Zugang: | BTU01 FRO01 TUM01 UBM01 UBT01 UBW01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (IX, 756 Seiten, 111 illus., 46 illus. in color) |
ISBN: | 9783319182759 |
DOI: | 10.1007/978-3-319-18275-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043208849 | ||
003 | DE-604 | ||
005 | 20200929 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319182759 |c Online |9 978-3-319-18275-9 | ||
024 | 7 | |a 10.1007/978-3-319-18275-9 |2 doi | |
035 | |a (OCoLC)923663499 | ||
035 | |a (DE-599)BVBBV043208849 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-703 |a DE-20 |a DE-739 |a DE-634 |a DE-861 |a DE-83 | ||
082 | 0 | |a 511.33 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a MAT 000 |2 stub | ||
245 | 1 | 0 | |a Computation, cryptography, and network security |c Nicholas J. Daras, Michael Th. Rassias, editors |
264 | 1 | |a Cham |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource (IX, 756 Seiten, 111 illus., 46 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Mathematics | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Algebra | |
650 | 4 | |a Ordered algebraic structures | |
650 | 4 | |a Approximation theory | |
650 | 4 | |a Number theory | |
650 | 4 | |a Operations research | |
650 | 4 | |a Management science | |
650 | 4 | |a Order, Lattices, Ordered Algebraic Structures | |
650 | 4 | |a Number Theory | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Approximations and Expansions | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Operations Research, Management Science | |
650 | 4 | |a Mathematik | |
700 | 1 | |a Daras, Nicholas J. |4 edt | |
700 | 1 | |a Rassias, Michael Th. |d 1987- |0 (DE-588)1054967091 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-18274-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-18275-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SMA | ||
940 | 1 | |q UBY_PDA_SMA | |
940 | 1 | |q ZDB-2-SMA_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632009 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l BTU01 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l FRO01 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l TUM01 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l UBM01 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l UBT01 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l UBW01 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-18275-9 |l UPA01 |p ZDB-2-SMA |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175706868940800 |
---|---|
adam_text | COMPUTATION, CRYPTOGRAPHY, AND NETWORK SECURITY
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
TRANSFORMATIONS OF CRYPTOGRAPHIC SCHEMES THROUGH INTERPOLATION
TECHNIQUES (S.-A.N. ALEXANDROPOULOS, G.C. MELETIOU, D.S. TRIANTAFYLLOU,
M.N. VRAHATIS)
FLAWS IN THE INITIALIZATION PROCESS OF STREAM CIPHERS (A. ALHAMDAN, H.
BARTLETT, E. DAWSON, L. SIMPSON, K. KOON-HO WONG)
PRODUCING FUZZY INCLUDION AND ENTROPY MEASURES (A.C. BOGIATZIS, B.K.
PAPADOPOULOS)
ON SOME RECENT RESULTS ON ASYMPTOTIC BEHAVIOR OF ORTHOGONAL POLYNOMIALS
ON THE UNIT CIRCLE AND INSERTING POINT MASSES (K. CASTILLO, F.
MARCELLAN)
ON THE UNSTABLE EQUILIBRIUM POINTS AND SYSTEM SEPARATIONS IN ELECTRIC
POWER SYSTEMS: A NUMERICAL STUDY (J. CUI, H.-D. CHIANG, T. WANG)
SECURITY AND FORMATION OF NETWORK-CENTRIC OPERATIONS (N.J. DARAS)
A BIO-INSPIRED HYBRID ARTIFICIAL INTELLIGENCE FRAMEWORK FOR CYBER
SECURITY (K. DEMERTZIS, L. ILIADIS)
INTEGRAL ESTIMATES FOR THE COMPOSITION OF GREEN S AND BOUNDED OPERATORS
(S. DING, Y. XING)
A SURVEY OF REVERSE INEQUALITIES FOR F-DIVERGENCE MEASURE IN INFORMATION
THEORY (S.S. DRAGOMIR)
ON GEOMETRY OF THE ZEROS OF A POLYNOMIAL (N.K. GOVIL, E.R. NWAEZE)
APPROXIMATION BY DURRMEYER TYPE OPERATORS PRESERVING LINEAR FUNCTIONS
(V. GUPTA)
REVISITING THE COMPLEX MULTIPLICATION METHOD FOR THE CONSTRUCTION OF
ELLIPTIC CURVES (E. KONSTANTINOU, A. KONTOGEORGIS)
GENERALIZED LAPLACE TRANSFORM INEQUALITIES IN MULTIPLE WEIGHTED ORLICZ
SPACES (J. KUANG)
THRESHOLD SECRET SHARING THROUGH MULTIVARIATE BIRKHOFF INTERPOLATION
(V.E. MARKOUTIS, G.C. MELETIOU, A.N. VENETI,M.N. VRAHATIS)
ADVANCED TRUNCATED DIFFERENTIAL ATTACKS AGAINST GOST BLOCK CIPHER AND
ITS VARIANTS (T. MOUROUZIS, N. COURTOIS)
A SUPPLY CHAIN GAME THEORY FRAMEWORK FOR CYBERSECURITY INVESTMENTS UNDER
NETWORK VULNERABILITY (A. NAGURNEY, L.S. NAGURNEY, S. SHUKLA)
A METHOD FOR CREATING PRIVATE AND ANONYMOUS DIGITAL TERRITORIES USING
ATTRIBUTE-BASED CREDENTIAL TECHNOLOGIES (P.E. NASTOU, D. NASTOULI, P.M.
PARDALOS, Y.C STAMATIOU)
QUANTAM ANALOGUES OF HERMITE–HADAMARD TYPE INEQUALITIES FORN WHICH IS
IMPLEMENTED IN MUPAD AND WHOSE COMPUTABILITY IS AN OPEN PROBLEM (A.
TYSZKA)
IMAGE ENCRYPTION SCHEME BASED ON NON-AUTONOMOUS CHAOTIC SYSTEMS (C.K.
VOLOS, I.M. KYPRIANIDIS, I. STOUBOULOS, V.-T. PHAM)
MULTIPLE PARAMETERIZED YANG–HILBERT-TYPE INTEGRAL INEQUALITIES (B.
YANG)
PARAMETERIZED YANG–HILBERT-TYPE INTEGRAL INEQUALITIES ANDTHEIR
OPERATOR EXPRESSIONS(B. YANG, M.TH. RASSIAS)
A SECURE COMMUNICATION DESIGN BASED ON THE CHAOTIC LOGISTIC MAP: AN
EXPERIMENTAL REALIZATION USING ARDUINO MICROCONTROLLERS (M. ZAPATEIRO DE
LA HOZ, L. ACHO, Y. VIDAL)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COMPUTATION, CRYPTOGRAPHY, AND NETWORK SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
ANALYSIS, ASSESSMENT, AND DATA MANAGEMENT ARE CORE COMPETENCIES FOR
OPERATION RESEARCH ANALYSTS. THIS VOLUME ADDRESSES A NUMBER OF ISSUES
AND DEVELOPED METHODS FOR IMPROVING THOSE SKILLS. IT IS AN OUTGROWTH OF
A CONFERENCE HELD IN APRIL 2013 AT THE HELLENIC MILITARY ACADEMY, AND
BRINGS TOGETHER A BROAD VARIETY OF MATHEMATICAL METHODS AND THEORIES
WITH SEVERAL APPLICATIONS. IT DISCUSSES DIRECTIONS AND PURSUITS OF
SCIENTISTS THAT PERTAIN TO ENGINEERING SCIENCES. IT IS ALSO PRESENTS THE
THEORETICAL BACKGROUND REQUIRED FOR ALGORITHMS AND TECHNIQUES APPLIED TO
A LARGE VARIETY OF CONCRETE PROBLEMS. A NUMBER OF OPEN QUESTIONS AS WELL
AS NEW FUTURE AREAS ARE ALSO HIGHLIGHTED. THIS BOOK WILL APPEAL TO
OPERATIONS RESEARCH ANALYSTS, ENGINEERS, COMMUNITY DECISION MAKERS,
ACADEMICS, THE MILITARY COMMUNITY, PRACTITIONERS SHARING THE CURRENT
“STATE-OF-THE-ART,” AND ANALYSTS FROM COALITION PARTNERS. TOPICS
COVERED INCLUDE OPERATIONS RESEARCH, GAMES AND CONTROL THEORY,
COMPUTATIONAL NUMBER THEORY AND INFORMATION SECURITY, SCIENTIFIC
COMPUTING AND APPLICATIONS, STATISTICAL MODELING AND APPLICATIONS,
SYSTEMS OF MONITORING AND SPATIAL ANALYSIS.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Daras, Nicholas J. Rassias, Michael Th. 1987- |
author2_role | edt edt |
author2_variant | n j d nj njd m t r mt mtr |
author_GND | (DE-588)1054967091 |
author_facet | Daras, Nicholas J. Rassias, Michael Th. 1987- |
building | Verbundindex |
bvnumber | BV043208849 |
classification_rvk | ST 276 ST 200 |
classification_tum | MAT 000 |
collection | ZDB-2-SMA |
ctrlnum | (OCoLC)923663499 (DE-599)BVBBV043208849 |
dewey-full | 511.33 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 511 - General principles of mathematics |
dewey-raw | 511.33 |
dewey-search | 511.33 |
dewey-sort | 3511.33 |
dewey-tens | 510 - Mathematics |
discipline | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-319-18275-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03206nmm a2200697zc 4500</leader><controlfield tag="001">BV043208849</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200929 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319182759</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-18275-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-18275-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)923663499</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043208849</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">511.33</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computation, cryptography, and network security</subfield><subfield code="c">Nicholas J. Daras, Michael Th. Rassias, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (IX, 756 Seiten, 111 illus., 46 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algebra</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordered algebraic structures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Approximation theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operations research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Order, Lattices, Ordered Algebraic Structures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Approximations and Expansions</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operations Research, Management Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Daras, Nicholas J.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rassias, Michael Th.</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1054967091</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-18274-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SMA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBY_PDA_SMA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SMA_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632009</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-18275-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043208849 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:33Z |
institution | BVB |
isbn | 9783319182759 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632009 |
oclc_num | 923663499 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-703 DE-20 DE-739 DE-634 DE-861 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-703 DE-20 DE-739 DE-634 DE-861 DE-83 |
physical | 1 Online Ressource (IX, 756 Seiten, 111 illus., 46 illus. in color) |
psigel | ZDB-2-SMA UBY_PDA_SMA ZDB-2-SMA_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
spelling | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors Cham Springer [2015] © 2015 1 Online Ressource (IX, 756 Seiten, 111 illus., 46 illus. in color) txt rdacontent c rdamedia cr rdacarrier Mathematics Computer organization Coding theory Algebra Ordered algebraic structures Approximation theory Number theory Operations research Management science Order, Lattices, Ordered Algebraic Structures Number Theory Coding and Information Theory Approximations and Expansions Computer Systems Organization and Communication Networks Operations Research, Management Science Mathematik Daras, Nicholas J. edt Rassias, Michael Th. 1987- (DE-588)1054967091 edt Erscheint auch als Druckausgabe 978-3-319-18274-2 https://doi.org/10.1007/978-3-319-18275-9 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Computation, cryptography, and network security Mathematics Computer organization Coding theory Algebra Ordered algebraic structures Approximation theory Number theory Operations research Management science Order, Lattices, Ordered Algebraic Structures Number Theory Coding and Information Theory Approximations and Expansions Computer Systems Organization and Communication Networks Operations Research, Management Science Mathematik |
title | Computation, cryptography, and network security |
title_auth | Computation, cryptography, and network security |
title_exact_search | Computation, cryptography, and network security |
title_full | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors |
title_fullStr | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors |
title_full_unstemmed | Computation, cryptography, and network security Nicholas J. Daras, Michael Th. Rassias, editors |
title_short | Computation, cryptography, and network security |
title_sort | computation cryptography and network security |
topic | Mathematics Computer organization Coding theory Algebra Ordered algebraic structures Approximation theory Number theory Operations research Management science Order, Lattices, Ordered Algebraic Structures Number Theory Coding and Information Theory Approximations and Expansions Computer Systems Organization and Communication Networks Operations Research, Management Science Mathematik |
topic_facet | Mathematics Computer organization Coding theory Algebra Ordered algebraic structures Approximation theory Number theory Operations research Management science Order, Lattices, Ordered Algebraic Structures Number Theory Coding and Information Theory Approximations and Expansions Computer Systems Organization and Communication Networks Operations Research, Management Science Mathematik |
url | https://doi.org/10.1007/978-3-319-18275-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632009&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT darasnicholasj computationcryptographyandnetworksecurity AT rassiasmichaelth computationcryptographyandnetworksecurity |