Editors:
- Discusses latest results in the subjects of computation, cryptography and network security
- Contains discussion from a converging range of interdisciplinary fields with a large breadth of technological applications
- Develops courses of action or methodologies to reconcile the issues identified
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (28 chapters)
-
Front Matter
About this book
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.
This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.
Reviews
“The stated audience for the book includes academicians, decision makers, engineers, experts in the field of operations research, the armed forces, and practitioners. … The book is very specialized and mathematically sophisticated … . A number of practical applications are considered in the book. … The publication of the book is timely and the topics in the book are of current interest. … I strongly recommend this book for its intended audience.” (S. V. Nagaraj, Computing Reviews, April, 2016)
Editors and Affiliations
-
Department of Mathematics and Engineering, Hellenic Military Academy, Vari Attikis, Greece
Nicholas J. Daras
-
Department of Mathematics, ETH Zürich, Zürich, Switzerland
Michael Th. Rassias
Bibliographic Information
Book Title: Computation, Cryptography, and Network Security
Editors: Nicholas J. Daras, Michael Th. Rassias
DOI: https://doi.org/10.1007/978-3-319-18275-9
Publisher: Springer Cham
eBook Packages: Mathematics and Statistics, Mathematics and Statistics (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Hardcover ISBN: 978-3-319-18274-2Published: 28 September 2015
Softcover ISBN: 978-3-319-37263-1Published: 29 October 2016
eBook ISBN: 978-3-319-18275-9Published: 16 September 2015
Edition Number: 1
Number of Pages: IX, 756
Number of Illustrations: 65 b/w illustrations, 46 illustrations in colour
Topics: Order, Lattices, Ordered Algebraic Structures, Number Theory, Coding and Information Theory, Approximations and Expansions, Computer Systems Organization and Communication Networks, Operations Research, Management Science