Computation, Cryptography, and Network Security
Editor
- Nicholas J. Daras(Hellenic Military Academy, Department of Mathematics and Engineering)Michael Th. Rassias(ETH Zürich, Department of Mathematics)
Abstract
Individual chapters are listed in the "Chapters" tab
Suggested Citation
DOI: 10.1007/978-3-319-18275-9
Download full text from publisher
To our knowledge, this item is not available for download. To find whether it is available, there are three options:1. Check below whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a for a similarly titled item that would be available.
Book Chapters
The following chapters of this book are listed in IDEAS- Stamatios-Aggelos N. Alexandropoulos & Gerasimos C. Meletiou & Dimitrios S. Triantafyllou & Michael N. Vrahatis, 2015. "Transformations of Cryptographic Schemes Through Interpolation Techniques," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 1-17, Springer.
- Ali Alhamdan & Harry Bartlett & Ed Dawson & Leonie Simpson & Kenneth Koon-Ho Wong, 2015. "Flaws in the Initialisation Process of Stream Ciphers," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 19-49, Springer.
- Athanasios C. Bogiatzis & Basil K. Papadopoulos, 2015. "Producing Fuzzy Inclusion and Entropy Measures," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 51-74, Springer.
- Kenier Castillo & Francisco Marcellán, 2015. "On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 75-101, Springer.
- Jinda Cui & Hsiao-Dong Chiang & Tao Wang, 2015. "On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Study," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 103-122, Springer.
- Nicholas J. Daras, 2015. "Security and Formation of Network-Centric Operations," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 123-160, Springer.
- Konstantinos Demertzis & Lazaros Iliadis, 2015. "A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 161-193, Springer.
- Shusen Ding & Yuming Xing, 2015. "Integral Estimates for the Composition of Green’s and Bounded Operators," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 195-208, Springer.
- S. S. Dragomir, 2015. "A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 209-251, Springer.
- N. K. Govil & Eze R. Nwaeze, 2015. "On Geometry of the Zeros of a Polynomial," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 253-287, Springer.
- Vijay Gupta, 2015. "Approximation by Durrmeyer Type Operators Preserving Linear Functions," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 289-298, Springer.
- Elisavet Konstantinou & Aristides Kontogeorgis, 2015. "Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 299-318, Springer.
- Jichang Kuang, 2015. "Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 319-329, Springer.
- Vasileios E. Markoutis & Gerasimos C. Meletiou & Aphrodite N. Veneti & Michael N. Vrahatis, 2015. "Threshold Secret Sharing Through Multivariate Birkhoff Interpolation," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 331-350, Springer.
- Theodosis Mourouzis & Nicolas Courtois, 2015. "Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 351-380, Springer.
- Anna Nagurney & Ladimer S. Nagurney & Shivani Shukla, 2015. "A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 381-398, Springer.
- Panayotis E. Nastou & Dimitra Nastouli & Panos M. Pardalos & Yannis C. Stamatiou, 2015. "A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 399-412, Springer.
- Muhammad Aslam Noor & Khalida Inayat Noor & Muhammad Uzair Awan, 2015. "Quantum Analogues of Hermite–Hadamard Type Inequalities for Generalized Convexity," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 413-439, Springer.
- Dimitrios Poulakis & Robert Rolland, 2015. "A Digital Signature Scheme Based on Two Hard Problems," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 441-450, Springer.
- Robert Rolland, 2015. "Randomness in Cryptography," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 451-459, Springer.
- Benjamin Tams & Michael Th. Rassias & Preda Mihăilescu, 2015. "Current Challenges for IT Security with Focus on Biometry," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 461-491, Springer.
- Thomas L. Toulias & Christos P. Kitsos, 2015. "Generalizations of Entropy and Information Measures," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 493-524, Springer.
- Mihai Turinici, 2015. "Maximal and Variational Principles in Vector Spaces," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 525-575, Springer.
- Apoloniusz Tyszka, 2015. "All Functions g : ℕ → ℕ $$g: \mathbb{N} \rightarrow \mathbb{N}$$ Which have a Single-Fold Diophantine Representation are Dominated by a Limit-Computable Function f : ℕ ∖ { 0 } → ℕ $$f: \mathbb{N}\setm," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 577-590, Springer.
- Christos K. Volos & Ioannis M. Kyprianidis & Ioannis Stouboulos & Viet-Thanh Pham, 2015. "Image Encryption Scheme Based on Non-autonomous Chaotic Systems," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 591-612, Springer.
- Bicheng Yang, 2015. "Multiple Parameterize Yang-Hilbert-Type Integral Inequalities," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 613-633, Springer.
- Bicheng Yang & Michael Th. Rassias, 2015. "Parameterized Yang–Hilbert-Type Integral Inequalities and Their Operator Expressions," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 635-736, Springer.
- Mauricio Zapateiro De la Hoz & Leonardo Acho & Yolanda Vidal, 2015. "A Secure Communication Design Based on the Chaotic Logistic Map: An Experimental Realization Using Arduino Microcontrollers," Springer Books, in: Nicholas J. Daras & Michael Th. Rassias (ed.), Computation, Cryptography, and Network Security, pages 737-756, Springer.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprbok:978-3-319-18275-9. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.
Printed from https://ideas.repec.org/b/spr/sprbok/978-3-319-18275-9.html