Computation, Cryptography, and Network Security
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a br...
Corporate Author: | |
---|---|
Other Authors: | , |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Edition: | 1st ed. 2015. |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-319-18275-9 |
Table of Contents:
- Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis)
- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong)
- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos)
- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán)
- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang)
- Security and Formation of Network-Centric Operations (N.J. Daras)
- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis)
- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing)
- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir)
- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze)
- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta)
- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis)
- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang)
- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis)
- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois)
- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla)
- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou)
- Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka)
- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham)
- Multiple Parameterized Yang–Hilbert-Type Integral Inequalities (B. Yang)
- Parameterized Yang–Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias)
- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal).