Advertisement

Computation, Cryptography, and Network Security

  • Nicholas J. Daras
  • Michael Th. Rassias

Table of contents

  1. Front Matter
    Pages i-ix
  2. Stamatios-Aggelos N. Alexandropoulos, Gerasimos C. Meletiou, Dimitrios S. Triantafyllou, Michael N. Vrahatis
    Pages 1-17
  3. Ali Alhamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong
    Pages 19-49
  4. Athanasios C. Bogiatzis, Basil K. Papadopoulos
    Pages 51-74
  5. Konstantinos Demertzis, Lazaros Iliadis
    Pages 161-193
  6. N. K. Govil, Eze R. Nwaeze
    Pages 253-287
  7. Elisavet Konstantinou, Aristides Kontogeorgis
    Pages 299-318
  8. Vasileios E. Markoutis, Gerasimos C. Meletiou, Aphrodite N. Veneti, Michael N. Vrahatis
    Pages 331-350
  9. Anna Nagurney, Ladimer S. Nagurney, Shivani Shukla
    Pages 381-398
  10. Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos, Yannis C. Stamatiou
    Pages 399-412
  11. Muhammad Aslam Noor, Khalida Inayat Noor, Muhammad Uzair Awan
    Pages 413-439
  12. Dimitrios Poulakis, Robert Rolland
    Pages 441-450
  13. Robert Rolland
    Pages 451-459
  14. Benjamin Tams, Michael Th. Rassias, Preda Mihăilescu
    Pages 461-491
  15. Thomas L. Toulias, Christos P. Kitsos
    Pages 493-524
  16. Christos K. Volos, Ioannis M. Kyprianidis, Ioannis Stouboulos, Viet-Thanh Pham
    Pages 591-612

About this book

Introduction

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.

 

This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.

 

Keywords

biometrics computer security cryptanalysis cryptosystems elliptic curves quantum cryptography

Editors and affiliations

  • Nicholas J. Daras
    • 1
  • Michael Th. Rassias
    • 2
  1. 1.Department of Mathematics and EngineeringHellenic Military AcademyVari AttikisGreece
  2. 2.Department of MathematicsETH ZürichZürichSwitzerland

Bibliographic information

Industry Sectors
Pharma
Biotechnology
Aerospace
Oil, Gas & Geosciences