Skip to main content

Computation, Cryptography, and Network Security

  • Book
  • © 2015

Overview

  • Discusses latest results in the subjects of computation, cryptography and network security
  • Contains discussion from a converging range of interdisciplinary fields with a large breadth of technological applications
  • Develops courses of action or methodologies to reconcile the issues identified

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (28 chapters)

Keywords

About this book

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.

This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.

Reviews

“The stated audience for the book includes academicians, decision makers, engineers, experts in the field of operations research, the armed forces, and practitioners. … The book is very specialized and mathematically sophisticated … . A number of practical applications are considered in the book. … The publication of the book is timely and the topics in the book are of current interest. … I strongly recommend this book for its intended audience.” (S. V. Nagaraj, Computing Reviews, April, 2016)

Editors and Affiliations

  • Department of Mathematics and Engineering, Hellenic Military Academy, Vari Attikis, Greece

    Nicholas J. Daras

  • Department of Mathematics, ETH Zürich, Zürich, Switzerland

    Michael Th. Rassias

Bibliographic Information

Publish with us