Computation, Cryptography, and Network Security
Edited by Nicholas J. Daras () and
Michael Th. Rassias ()
in Springer Books from Springer
Date: 2015
ISBN: 978-3-319-18275-9
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Chapters in this book:
- Transformations of Cryptographic Schemes Through Interpolation Techniques
- Stamatios-Aggelos N. Alexandropoulos, Gerasimos C. Meletiou, Dimitrios S. Triantafyllou and Michael N. Vrahatis
- Flaws in the Initialisation Process of Stream Ciphers
- Ali Alhamdan, Harry Bartlett, Ed Dawson, Leonie Simpson and Kenneth Koon-Ho Wong
- Producing Fuzzy Inclusion and Entropy Measures
- Athanasios C. Bogiatzis and Basil K. Papadopoulos
- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses
- Kenier Castillo and Francisco Marcellán
- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Study
- Jinda Cui, Hsiao-Dong Chiang and Tao Wang
- Security and Formation of Network-Centric Operations
- Nicholas J. Daras
- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security
- Konstantinos Demertzis and Lazaros Iliadis
- Integral Estimates for the Composition of Green’s and Bounded Operators
- Shusen Ding and Yuming Xing
- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory
- S. S. Dragomir
- On Geometry of the Zeros of a Polynomial
- N. K. Govil and Eze R. Nwaeze
- Approximation by Durrmeyer Type Operators Preserving Linear Functions
- Vijay Gupta
- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves
- Elisavet Konstantinou and Aristides Kontogeorgis
- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces
- Jichang Kuang
- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation
- Vasileios E. Markoutis, Gerasimos C. Meletiou, Aphrodite N. Veneti and Michael N. Vrahatis
- Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants
- Theodosis Mourouzis and Nicolas Courtois
- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
- Anna Nagurney, Ladimer S. Nagurney and Shivani Shukla
- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies
- Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos and Yannis C. Stamatiou
- Quantum Analogues of Hermite–Hadamard Type Inequalities for Generalized Convexity
- Muhammad Aslam Noor, Khalida Inayat Noor and Muhammad Uzair Awan
- A Digital Signature Scheme Based on Two Hard Problems
- Dimitrios Poulakis and Robert Rolland
- Randomness in Cryptography
- Robert Rolland
- Current Challenges for IT Security with Focus on Biometry
- Benjamin Tams, Michael Th. Rassias and Preda Mihăilescu
- Generalizations of Entropy and Information Measures
- Thomas L. Toulias and Christos P. Kitsos
- Maximal and Variational Principles in Vector Spaces
- Mihai Turinici
- All Functions g: ℕ → ℕ $$g: \mathbb{N} \rightarrow \mathbb{N}$$ Which have a Single-Fold Diophantine Representation are Dominated by a Limit-Computable Function f: ℕ ∖ { 0 } → ℕ $$f: \mathbb{N}\setminus \{0\} \rightarrow \mathbb{N}$$ Which is Implemented in MuPAD and Whose Computability is an Open Problem
- Apoloniusz Tyszka
- Image Encryption Scheme Based on Non-autonomous Chaotic Systems
- Christos K. Volos, Ioannis M. Kyprianidis, Ioannis Stouboulos and Viet-Thanh Pham
- Multiple Parameterize Yang-Hilbert-Type Integral Inequalities
- Bicheng Yang
- Parameterized Yang–Hilbert-Type Integral Inequalities and Their Operator Expressions
- Bicheng Yang and Michael Th. Rassias
- A Secure Communication Design Based on the Chaotic Logistic Map: An Experimental Realization Using Arduino Microcontrollers
- Mauricio Zapateiro De la Hoz, Leonardo Acho and Yolanda Vidal
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprbok:978-3-319-18275-9
Ordering information: This item can be ordered from
http://www.springer.com/9783319182759
DOI: 10.1007/978-3-319-18275-9
Access Statistics for this book
More books in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().