Skip to main content
  • Book
  • © 2015

Computation, Cryptography, and Network Security

  • Discusses latest results in the subjects of computation, cryptography and network security
  • Contains discussion from a converging range of interdisciplinary fields with a large breadth of technological applications
  • Develops courses of action or methodologies to reconcile the issues identified

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 chapters)

  1. Randomness in Cryptography

    • Robert Rolland
    Pages 451-459
  2. Current Challenges for IT Security with Focus on Biometry

    • Benjamin Tams, Michael Th. Rassias, Preda Mihăilescu
    Pages 461-491
  3. Generalizations of Entropy and Information Measures

    • Thomas L. Toulias, Christos P. Kitsos
    Pages 493-524
  4. Image Encryption Scheme Based on Non-autonomous Chaotic Systems

    • Christos K. Volos, Ioannis M. Kyprianidis, Ioannis Stouboulos, Viet-Thanh Pham
    Pages 591-612

About this book

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.

This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.

Reviews

“The stated audience for the book includes academicians, decision makers, engineers, experts in the field of operations research, the armed forces, and practitioners. … The book is very specialized and mathematically sophisticated … . A number of practical applications are considered in the book. … The publication of the book is timely and the topics in the book are of current interest. … I strongly recommend this book for its intended audience.” (S. V. Nagaraj, Computing Reviews, April, 2016)

Editors and Affiliations

  • Department of Mathematics and Engineering, Hellenic Military Academy, Vari Attikis, Greece

    Nicholas J. Daras

  • Department of Mathematics, ETH Zürich, Zürich, Switzerland

    Michael Th. Rassias

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access