A. WESLEY POWELL LEARNING RESOURCE CENTRE (WPLRC)

Wonderful Place to Learn, Research & Collaborate

Computation, Cryptography, and Network Security / (Record no. 18558)

MARC details
000 -LEADER
fixed length control field 05798cam a22005055i 4500
001 - ACCESSION NUMBER
control field 18275
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220321163614.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m |o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150915s2015 gw |||| o |||| 0|eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319182759
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-18275-9
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (DE-He213)978-3-319-18275-9
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions pn
-- rda
Transcribing agency DDC
072 #7 - SUBJECT CATEGORY CODE
Subject category code MAT002010
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code PBF
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code PBF
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number R/AF/896
Edition number 23
245 00 - TITLE STATEMENT
Title Computation, Cryptography, and Network Security /
Statement of responsibility, etc. edited by Nicholas J. Daras, Michael Th. Rassias.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2015.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (IX, 756 pages 111 illustrations, 46 illustrations in color.)
Dimensions 22 CM
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite-Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang-Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang-Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal).
520 ## - SUMMARY, ETC.
Summary, etc. Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current "state-of-the-art," and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis..
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher-supplied MARC data.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Authority record control number https://scigraph.springernature.com/ontologies/product-market-codes/M11124
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Authority record control number https://scigraph.springernature.com/ontologies/product-market-codes/M12023
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Authority record control number https://scigraph.springernature.com/ontologies/product-market-codes/I15041
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Authority record control number https://scigraph.springernature.com/ontologies/product-market-codes/I13006
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Authority record control number https://scigraph.springernature.com/ontologies/product-market-codes/M25001
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Authority record control number https://scigraph.springernature.com/ontologies/product-market-codes/M26024
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Daras, Nicholas J.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rassias, Michael Th.
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Computation, cryptography, and network security
International Standard Book Number 9783319182742
Record control number (DLC) 2015945103
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319182742
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319182766
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319372631
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c origres
d u
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Wesley Powell Learning Resource Centre Wesley Powell Learning Resource Centre 03/21/2022   R/AF/896 18275 03/21/2022 03/21/2022 Books