Computation, Cryptography, and Network Security

  • Nicholas J. Daras
  • Michael Th. Rassias

Table of contents

  1. Front Matter
    Pages i-ix
  2. Stamatios-Aggelos N. Alexandropoulos, Gerasimos C. Meletiou, Dimitrios S. Triantafyllou, Michael N. Vrahatis
    Pages 1-17
  3. Ali Alhamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong
    Pages 19-49
  4. Athanasios C. Bogiatzis, Basil K. Papadopoulos
    Pages 51-74
  5. Konstantinos Demertzis, Lazaros Iliadis
    Pages 161-193
  6. N. K. Govil, Eze R. Nwaeze
    Pages 253-287
  7. Elisavet Konstantinou, Aristides Kontogeorgis
    Pages 299-318
  8. Vasileios E. Markoutis, Gerasimos C. Meletiou, Aphrodite N. Veneti, Michael N. Vrahatis
    Pages 331-350
  9. Anna Nagurney, Ladimer S. Nagurney, Shivani Shukla
    Pages 381-398
  10. Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos, Yannis C. Stamatiou
    Pages 399-412
  11. Muhammad Aslam Noor, Khalida Inayat Noor, Muhammad Uzair Awan
    Pages 413-439
  12. Dimitrios Poulakis, Robert Rolland
    Pages 441-450

About this book

Introduction

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.

 

This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.

 

Keywords

biometrics computer security cryptanalysis cryptosystems elliptic curves quantum cryptography

Editors and affiliations

  • Nicholas J. Daras
    • 1
  • Michael Th. Rassias
    • 2
  1. 1.Department of Mathematics and EngineeringHellenic Military AcademyVari AttikisGreece
  2. 2.Department of MathematicsETH ZürichZürichSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-18275-9
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Mathematics and Statistics
  • Print ISBN 978-3-319-18274-2
  • Online ISBN 978-3-319-18275-9
  • About this book
Industry Sectors
Aerospace
Biotechnology
Pharma