Borrow it
 African Studies Library
 Alumni Medical Library
 Astronomy Library
 Fineman and Pappas Law Libraries
 Frederick S. Pardee Management Library
 Howard Gotlieb Archival Research Center
 Mugar Memorial Library
 Music Library
 Pikering Educational Resources Library
 School of Theology Library
 Science & Engineering Library
 Stone Science Library
The Resource Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
Resource Information
The item Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
 Summary
 Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “stateoftheart,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.
 Language
 eng
 Extent
 IX, 756 p. 111 illus., 46 illus. in color.
 Contents

 Transformations of Cryptographic Schemes Through Interpolation Techniques (S.A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)
 Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. KoonHo Wong)
 Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)
 On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)
 On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.D. Chiang, T. Wang)
 Security and Formation of NetworkCentric Operations (N.J. Daras)
 A BioInspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)
 Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)
 A Survey of Reverse Inequalities for fDivergence Measure in Information Theory (S.S. Dragomir)
 On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)
 Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)
 Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)
 Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)
 Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)
 Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)
 A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)
 A Method for Creating Private and Anonymous Digital Territories Using AttributeBased Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)
 Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)
 Image Encryption Scheme Based on NonAutonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.T. Pham)
 Multiple Parameterized Yang–HilbertType Integral Inequalities (B. Yang)
 Parameterized Yang–HilbertType Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)
 A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
 Isbn
 9783319182759
 Label
 Computation, Cryptography, and Network Security
 Title
 Computation, Cryptography, and Network Security
 Statement of responsibility
 edited by Nicholas J. Daras, Michael Th. Rassias
 Subject

 Algebra
 Number theory
 Approximation theory
 Number Theory
 Computer organization
 Coding theory
 Number theory
 Operations Research, Management Science
 Number Theory
 Management science
 Approximations and Expansions
 Coding theory
 Coding theory
 Operations research
 Order, Lattices, Ordered Algebraic Structures
 Computer Systems Organization and Communication Networks
 Ordered algebraic structures
 Ordered algebraic structures
 Coding and Information Theory
 Electronic resources
 Management science
 Mathematics
 Operations research
 Mathematics
 Algebra
 Computer organization
 Approximation theory
 Language
 eng
 Summary
 Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “stateoftheart,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.
 Image bit depth
 0
 LC call number

 QA172172.4
 QA171.5
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName

 Daras, Nicholas J.
 Rassias, Michael Th.
 SpringerLink
 http://library.link/vocab/subjectName

 Mathematics
 Computer organization
 Coding theory
 Algebra
 Ordered algebraic structures
 Approximation theory
 Number theory
 Operations research
 Management science
 Mathematics
 Order, Lattices, Ordered Algebraic Structures
 Number Theory
 Coding and Information Theory
 Approximations and Expansions
 Computer Systems Organization and Communication Networks
 Operations Research, Management Science
 Label
 Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Transformations of Cryptographic Schemes Through Interpolation Techniques (S.A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)  Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. KoonHo Wong)  Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)  On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)  On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.D. Chiang, T. Wang)  Security and Formation of NetworkCentric Operations (N.J. Daras)  A BioInspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)  Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)  A Survey of Reverse Inequalities for fDivergence Measure in Information Theory (S.S. Dragomir)  On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)  Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)  Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)  Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)  Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)  Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)  A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)  A Method for Creating Private and Anonymous Digital Territories Using AttributeBased Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)  Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)  Image Encryption Scheme Based on NonAutonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.T. Pham)  Multiple Parameterized Yang–HilbertType Integral Inequalities (B. Yang)  Parameterized Yang–HilbertType Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)  A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
 Dimensions
 unknown
 Extent
 IX, 756 p. 111 illus., 46 illus. in color.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783319182759
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/9783319182759
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783319182759
 Label
 Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Transformations of Cryptographic Schemes Through Interpolation Techniques (S.A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)  Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. KoonHo Wong)  Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)  On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)  On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.D. Chiang, T. Wang)  Security and Formation of NetworkCentric Operations (N.J. Daras)  A BioInspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)  Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)  A Survey of Reverse Inequalities for fDivergence Measure in Information Theory (S.S. Dragomir)  On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)  Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)  Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)  Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)  Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)  Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)  A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)  A Method for Creating Private and Anonymous Digital Territories Using AttributeBased Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)  Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)  Image Encryption Scheme Based on NonAutonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.T. Pham)  Multiple Parameterized Yang–HilbertType Integral Inequalities (B. Yang)  Parameterized Yang–HilbertType Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)  A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal)
 Dimensions
 unknown
 Extent
 IX, 756 p. 111 illus., 46 illus. in color.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783319182759
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/9783319182759
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783319182759
Subject
 Algebra
 Algebra
 Approximation theory
 Approximation theory
 Approximations and Expansions
 Coding and Information Theory
 Coding theory
 Coding theory
 Coding theory
 Computer Systems Organization and Communication Networks
 Computer organization
 Computer organization
 Electronic resources
 Management science
 Management science
 Mathematics
 Mathematics
 Number Theory
 Number Theory
 Number theory
 Number theory
 Operations Research, Management Science
 Operations research
 Operations research
 Order, Lattices, Ordered Algebraic Structures
 Ordered algebraic structures
 Ordered algebraic structures
Library Locations

African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 71.108227


Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 71.105717

Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 71.107023

Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 71.099547

Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 71.108227


Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 71.108227

Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 71.101425

School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 71.107235

Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 71.102257

Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/ComputationCryptographyandNetworkSecurity/mIy7gbUyOxQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/ComputationCryptographyandNetworkSecurity/mIy7gbUyOxQ/">Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/ComputationCryptographyandNetworkSecurity/mIy7gbUyOxQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/ComputationCryptographyandNetworkSecurity/mIy7gbUyOxQ/">Computation, Cryptography, and Network Security, edited by Nicholas J. Daras, Michael Th. Rassias, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>