Text
Computation, cryptography, and network security
CONTENTS:
1. Machine generated contents note: Transformations of Cryptographic Schemes Through Interpolation Techniques / Michael N. Vrahatis
2. Flaws in the Initialisation Process of Stream Ciphers / Kenneth Koon-Ho Wong
3. Producing Fuzzy Inclusion and Entropy Measures / Basil K. Papadopoulos
4. On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses / Francisco Marcellan
5. On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Study / Tao Wang
6. Security and Formation of Network-Centric Operations / Nicholas J. Daras
7. A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security / Lazaros Iliadis
8. Integral Estimates for the Composition of Green's and Bounded Operators / Yuming Xing
9. A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory / S.S. Dragomir
10. On Geometry of the Zeros of a Polynomial / Eze R. Nwaeze
11. Contents note continued: Approximation by Durrmeyer Type Operators Preserving Linear Functions / Vijay Gupta
12. Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves / Aristides Kontogeorgis
13. Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces / Jichang Kuang
14. Threshold Secret Sharing Through Multivariate Birkhoff Interpolation / Michael N. Vrahatis
15. Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants / Nicolas Courtois
16. A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability / Shivani Shukla
17. A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies / Yannis C. Stamatiou
18. Quantum Analogues of Hermite-Hadamard Type Inequalities for Generalized Convexity / Muhammad Uzair Awan
19. A Digital Signature Scheme Based on Two Hard Problems / Robert Rolland
20. Contents note continued: Randomness in Cryptography / Robert Rolland
21. Current Challenges for IT Security with Focus on Biometry / Preda Mihailescu
22. Generalizations of Entropy and Information Measures / Christos P. Kitsos
23. Maximal and Variational Principles in Vector Spaces / Mihai Turinici
24. All Functions g:N [→] N Which have a Single-Fold Diophantine Representation are Dominated by a Limit-Computable Function f:N \ {0} [→] N Which is Implemented in MuPAD and Whose Computability is an Open Problem / Apoloniusz Tyszka
25. Image Encryption Scheme Based on Non-autonomous Chaotic Systems / Viet-Thanh Pham
26. Multiple Parameterize Yang-Hilbert-Type Integral Inequalities / Bicheng Yang
27. Parameterized Yang-Hilbert-Type Integral Inequalities and Their Operator Expressions / Michael Th. Rassias
No other version available