The Resource Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
Resource Information
The item Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in European University Institute.This item is available to borrow from 1 library branch.
Resource Information
The item Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in European University Institute.
This item is available to borrow from 1 library branch.
 Summary
 Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current zstateoftheart, y and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis
 Language
 eng
 Extent
 IX, 756 p. 111 illus., 46 illus. in color.
 Contents

 Transformations of Cryptographic Schemes Through Interpolation Techniques (S.A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)
 Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. KoonHo Wong)
 Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)
 On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)
 On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.D. Chiang, T. Wang)
 Security and Formation of NetworkCentric Operations (N.J. Daras)
 A BioInspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)
 Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)
 A Survey of Reverse Inequalities for fDivergence Measure in Information Theory (S.S. Dragomir)
 On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)
 Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)
 Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)
 Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)
 Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)
 Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)
 A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)
 A Method for Creating Private and Anonymous Digital Territories Using AttributeBased Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)
 Quantam Analogues of HermiteHadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)
 Image Encryption Scheme Based on NonAutonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.T. Pham)
 Multiple Parameterized YangHilbertType Integral Inequalities (B. Yang)
 Parameterized YangHilbertType Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)
 A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
 Isbn
 9783319182759
 Label
 Computation, Cryptography, and Network Security
 Title
 Computation, Cryptography, and Network Security
 Statement of responsibility
 edited by Nicholas J. Daras, Michael Th. Rassias
 Language
 eng
 Summary
 Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current zstateoftheart, y and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis
 Image bit depth
 0
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName

 Daras, Nicholas J.
 Rassias, Michael Th.
 SpringerLink (Online service)
 http://library.link/vocab/subjectName

 Mathematics
 Computer organization
 Coding theory
 Algebra
 Ordered algebraic structures
 Approximation theory
 Number theory
 Operations research
 Management science
 Label
 Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier.
 Color
 not applicable
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent.
 Contents
 Transformations of Cryptographic Schemes Through Interpolation Techniques (S.A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)  Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. KoonHo Wong)  Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)  On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)  On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.D. Chiang, T. Wang)  Security and Formation of NetworkCentric Operations (N.J. Daras)  A BioInspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)  Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)  A Survey of Reverse Inequalities for fDivergence Measure in Information Theory (S.S. Dragomir)  On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)  Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)  Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)  Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)  Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)  Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)  A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)  A Method for Creating Private and Anonymous Digital Territories Using AttributeBased Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)  Quantam Analogues of HermiteHadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)  Image Encryption Scheme Based on NonAutonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.T. Pham)  Multiple Parameterized YangHilbertType Integral Inequalities (B. Yang)  Parameterized YangHilbertType Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)  A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
 Control code
 9783319182759
 Dimensions
 unknown
 Extent
 IX, 756 p. 111 illus., 46 illus. in color.
 File format
 multiple file formats
 Form of item
 electronic
 Governing access note
 Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, noncommercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
 Isbn
 9783319182759
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia.
 Media type code

 c
 Other control number
 10.1007/9783319182759
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (OCoLC)1086462206
 Label
 Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier.
 Color
 not applicable
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent.
 Contents
 Transformations of Cryptographic Schemes Through Interpolation Techniques (S.A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)  Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. KoonHo Wong)  Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)  On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)  On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.D. Chiang, T. Wang)  Security and Formation of NetworkCentric Operations (N.J. Daras)  A BioInspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)  Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)  A Survey of Reverse Inequalities for fDivergence Measure in Information Theory (S.S. Dragomir)  On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)  Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)  Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)  Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)  Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)  Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)  A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)  A Method for Creating Private and Anonymous Digital Territories Using AttributeBased Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)  Quantam Analogues of HermiteHadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)  Image Encryption Scheme Based on NonAutonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.T. Pham)  Multiple Parameterized YangHilbertType Integral Inequalities (B. Yang)  Parameterized YangHilbertType Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)  A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
 Control code
 9783319182759
 Dimensions
 unknown
 Extent
 IX, 756 p. 111 illus., 46 illus. in color.
 File format
 multiple file formats
 Form of item
 electronic
 Governing access note
 Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, noncommercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
 Isbn
 9783319182759
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia.
 Media type code

 c
 Other control number
 10.1007/9783319182759
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (OCoLC)1086462206
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.eui.eu/portal/ComputationCryptographyandNetworkSecurity/T2XS3rP51W4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/portal/ComputationCryptographyandNetworkSecurity/T2XS3rP51W4/">Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.eui.eu/portal/ComputationCryptographyandNetworkSecurity/T2XS3rP51W4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/portal/ComputationCryptographyandNetworkSecurity/T2XS3rP51W4/">Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute</a></span></span></span></span></div>