標(biāo)題: Titlebook: Computation, Cryptography, and Network Security; Nicholas J. Daras,Michael Th. Rassias Book 2015 Springer International Publishing Switzer [打印本頁(yè)] 作者: 掩飾 時(shí)間: 2025-3-21 19:00
書(shū)目名稱Computation, Cryptography, and Network Security影響因子(影響力)
書(shū)目名稱Computation, Cryptography, and Network Security影響因子(影響力)學(xué)科排名
書(shū)目名稱Computation, Cryptography, and Network Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Computation, Cryptography, and Network Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Computation, Cryptography, and Network Security被引頻次
書(shū)目名稱Computation, Cryptography, and Network Security被引頻次學(xué)科排名
書(shū)目名稱Computation, Cryptography, and Network Security年度引用
書(shū)目名稱Computation, Cryptography, and Network Security年度引用學(xué)科排名
書(shū)目名稱Computation, Cryptography, and Network Security讀者反饋
書(shū)目名稱Computation, Cryptography, and Network Security讀者反饋學(xué)科排名
作者: 惹人反感 時(shí)間: 2025-3-21 21:43
Stromrichteranlagen der Starkstromtechnikthe Lucas logarithm problems are presented. Next, the representation of cryptographic functions through polynomials or algebraic functions as well as a special case of discrete logarithm problem is given. Finally, a study of cryptographic functions using factorization of matrices is analyzed.作者: NOCT 時(shí)間: 2025-3-22 00:36
https://doi.org/10.1007/978-3-642-81130-2esting models with promising results. Simulations are performed on the models of electric power systems, which demonstrate the effectiveness of the proposed scheme. This scheme has the potential of being applied to the contingency analysis of large-scale systems.作者: fidelity 時(shí)間: 2025-3-22 05:28
https://doi.org/10.1007/978-3-662-25008-2 given to illustrate the importance and significance of generalized convex sets and generalized convex functions. We establish some quantum Hermite–Hadamard inequalities for generalized convexity. Results proved in this paper may stimulate further research activities.作者: indices 時(shí)間: 2025-3-22 11:21 作者: Factual 時(shí)間: 2025-3-22 15:52
On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Stesting models with promising results. Simulations are performed on the models of electric power systems, which demonstrate the effectiveness of the proposed scheme. This scheme has the potential of being applied to the contingency analysis of large-scale systems.作者: Factual 時(shí)間: 2025-3-22 19:45
,Quantum Analogues of Hermite–Hadamard Type Inequalities for Generalized Convexity, given to illustrate the importance and significance of generalized convex sets and generalized convex functions. We establish some quantum Hermite–Hadamard inequalities for generalized convexity. Results proved in this paper may stimulate further research activities.作者: 向外供接觸 時(shí)間: 2025-3-23 00:18 作者: irreducible 時(shí)間: 2025-3-23 03:30
Eigenschaften des Stromsensors,auchy, who we believe were the earliest contributors in this subject, to some of the most recent ones. When possible, we have tried to present the proofs of some of the theorems. Also, included here are some results on evaluating the quality of bounds by using numerical methods or MATLAB.作者: Affluence 時(shí)間: 2025-3-23 07:57 作者: 貴族 時(shí)間: 2025-3-23 13:45
On Geometry of the Zeros of a Polynomial,auchy, who we believe were the earliest contributors in this subject, to some of the most recent ones. When possible, we have tried to present the proofs of some of the theorems. Also, included here are some results on evaluating the quality of bounds by using numerical methods or MATLAB.作者: intellect 時(shí)間: 2025-3-23 17:27 作者: 非實(shí)體 時(shí)間: 2025-3-23 18:41
,Stromrichter für Drehfeldmaschinen,nations. These flaws are illustrated using the A5/1 stream cipher as a case study. We also provide some design recommendations for the intialisation process in stream ciphers, to overcome these and other flaws.作者: syncope 時(shí)間: 2025-3-24 01:03 作者: periodontitis 時(shí)間: 2025-3-24 04:29
Transientes Verhalten von Drehfeldmaschinen,se an alternative axiomatization of fuzzy inclusion based on an already existing one. This allows us to introduce a category of subsethood and entropy measures which contains well-known indicators as well as new ones.作者: FATAL 時(shí)間: 2025-3-24 08:55 作者: 流出 時(shí)間: 2025-3-24 12:10
,Power-to-Gas – Technologien und Kosten,idea of generalizing Tassa’s scheme through multivariate Birkhoff interpolation. We consider the problem of finding secret sharing schemes with multilevel structures and partially ordered sets of levels of participants. In order to ensure that our scheme meets the necessary requirements, we use totally nonsingular matrices.作者: 迷住 時(shí)間: 2025-3-24 16:10
Producing Fuzzy Inclusion and Entropy Measures,se an alternative axiomatization of fuzzy inclusion based on an already existing one. This allows us to introduce a category of subsethood and entropy measures which contains well-known indicators as well as new ones.作者: Accrue 時(shí)間: 2025-3-24 20:37
Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves, an analysis on these polynomials, in this paper we will describe our results about finding new class invariants using the Shimura reciprocity law. Finally, we will see how the choice of the discriminant can affect the degree of the class polynomial and consequently the efficiency of the whole CM method.作者: 瑪瑙 時(shí)間: 2025-3-25 01:12
Threshold Secret Sharing Through Multivariate Birkhoff Interpolation,idea of generalizing Tassa’s scheme through multivariate Birkhoff interpolation. We consider the problem of finding secret sharing schemes with multilevel structures and partially ordered sets of levels of participants. In order to ensure that our scheme meets the necessary requirements, we use totally nonsingular matrices.作者: CRUC 時(shí)間: 2025-3-25 06:53
“state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis..978-3-319-37263-1978-3-319-18275-9作者: 控訴 時(shí)間: 2025-3-25 09:03 作者: 小畫(huà)像 時(shí)間: 2025-3-25 13:19 作者: resistant 時(shí)間: 2025-3-25 18:11 作者: 狼群 時(shí)間: 2025-3-25 23:24
A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability,en applied to two sets of numerical examples that reveal the impacts on the equilibrium product transactions, the security levels, the product prices, the expected profits, and the retailer vulnerability as well as the supply chain network vulnerability, of such issues as: increased competition, cha作者: 主講人 時(shí)間: 2025-3-26 00:51 作者: 結(jié)束 時(shí)間: 2025-3-26 07:29
Einphasiger Wechselstromsteller the evolving computational intelligence system for malware detection (ECISMD) that spots and isolates malwares located in packed executables untraceable by antivirus, and (c) the evolutionary prevention system from SQL injection (ePSSQLI) attacks, which early and smartly forecasts the attacks using作者: morale 時(shí)間: 2025-3-26 09:20
,Power-to-Gas – Technologien und Kosten,of these attacks were against the version of GOST which uses the standard set of S-boxes. In this paper, we study the security of many variants of GOST against advanced forms of differential attacks which are based on truncated differentials techniques. In particular we present an attack against ful作者: 確保 時(shí)間: 2025-3-26 16:10 作者: 無(wú)底 時(shí)間: 2025-3-26 19:38
Book 2015pics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis..作者: 舞蹈編排 時(shí)間: 2025-3-27 00:37
Stromrichteranlagen der Starkstromtechnike Diffie–Hellman cryptographic functions are given. Subsequently, the inverse Aitken and Neville interpolation methods for the discrete logarithm and the Lucas logarithm problems are presented. Next, the representation of cryptographic functions through polynomials or algebraic functions as well as 作者: SCORE 時(shí)間: 2025-3-27 04:50 作者: Decrepit 時(shí)間: 2025-3-27 09:02
Transientes Verhalten von Drehfeldmaschinen,iomatize fuzzy inclusion and entropy indicators. Others have introduced such measures based on specific desired properties. Significant results have been obtained; results that have led to a number of alternative solutions concerning several different applications. Apart from these interesting and i作者: 缺陷 時(shí)間: 2025-3-27 11:00 作者: 冬眠 時(shí)間: 2025-3-27 17:00 作者: 終點(diǎn) 時(shí)間: 2025-3-27 19:14
Mittelpunktschaltungen mit der Pulszahl s), and we mention its advantages. Moreover, we investigate security problem of NCOs by applying methods of vertex pursuit games. Finally, in Sect. . we take up with the problem of network centric warfare strategic formation.作者: Graves’-disease 時(shí)間: 2025-3-27 23:59
Einphasiger Wechselstromstellerof military information systems (MIS) and Networks (MNET) is a subject of continuous research and design, due to the fact that they manage, store, manipulate, and distribute the information. This study presents a bio-inspired hybrid artificial intelligence framework for cyber security (bioHAIFCS). T作者: 反復(fù)無(wú)常 時(shí)間: 2025-3-28 02:37 作者: 我沒(méi)有命令 時(shí)間: 2025-3-28 09:39 作者: colostrum 時(shí)間: 2025-3-28 12:07
https://doi.org/10.1007/978-3-658-15073-0In the core of this method, there is a special polynomial called Hilbert class polynomial which is constructed with input a fundamental discriminant.?0. The construction of this polynomial is the most demanding and time-consuming part of the method and thus the use of several alternative polynomia作者: CANE 時(shí)間: 2025-3-28 17:18 作者: oxidize 時(shí)間: 2025-3-28 20:28
,Power-to-Gas – Technologien und Kosten,ecurity can be even more increased by keeping the specifications of the S-boxes secret. GOST is implemented in many standard libraries such as OpenSSL and it has extremely low implementation cost and as a result of this it could be considered as a plausible alternative for AES-256 and 3-DES. Further作者: gimmick 時(shí)間: 2025-3-28 23:40 作者: enmesh 時(shí)間: 2025-3-29 03:18 作者: BUCK 時(shí)間: 2025-3-29 07:52 作者: 博愛(ài)家 時(shí)間: 2025-3-29 15:04 作者: intricacy 時(shí)間: 2025-3-29 18:35 作者: Flirtatious 時(shí)間: 2025-3-29 20:55
A Survey of Reverse Inequalities for ,-Divergence Measure in Information Theory,Jensen’s inequality. Applications in connection with H?lder’s inequality and for particular measures such as Kullback–Leibler divergence measure, Hellinger discrimination, ..-distance and variation distance are provided as well.作者: Tracheotomy 時(shí)間: 2025-3-30 02:58
A Digital Signature Scheme Based on Two Hard Problems,blem for elliptic curves. It is suitable for applications requiring long-term security and provides smaller signatures than the existing schemes based on the integer factorization and integer discrete logarithm problems.作者: relieve 時(shí)間: 2025-3-30 06:23
Nicholas J. Daras,Michael Th. RassiasDiscusses latest results in the subjects of computation, cryptography and network security.Contains discussion from a converging range of interdisciplinary fields with a large breadth of technological作者: 綠州 時(shí)間: 2025-3-30 12:16 作者: miscreant 時(shí)間: 2025-3-30 13:16 作者: interlude 時(shí)間: 2025-3-30 16:56
978-3-319-37263-1Springer International Publishing Switzerland 2015作者: ambivalence 時(shí)間: 2025-3-30 22:56
Mittelpunktschaltungen mit der Pulszahl s), and we mention its advantages. Moreover, we investigate security problem of NCOs by applying methods of vertex pursuit games. Finally, in Sect. . we take up with the problem of network centric warfare strategic formation.作者: 意見(jiàn)一致 時(shí)間: 2025-3-31 03:13 作者: Adjourn 時(shí)間: 2025-3-31 09:06
https://doi.org/10.1007/978-3-662-25008-2blem for elliptic curves. It is suitable for applications requiring long-term security and provides smaller signatures than the existing schemes based on the integer factorization and integer discrete logarithm problems.作者: Adornment 時(shí)間: 2025-3-31 12:12 作者: 增長(zhǎng) 時(shí)間: 2025-3-31 14:24
Eigenschaften des Stromsensors,In the present article, we propose a new sequence of linear positive operators having different basis, which are generalizations of Bernstein basis functions. We establish some convergence estimates which include link convergence, asymptotic formula, and direct estimates in terms of usual and Ditzian–Totik modulus of continuity.作者: Simulate 時(shí)間: 2025-3-31 20:24
https://doi.org/10.1007/978-3-658-15073-0In this paper we use quite different new methods to establish some new generalized Laplace transform inequalities in the multiple weighted Orlicz spaces. They are significant improvements and generalizations of many famous results.作者: violate 時(shí)間: 2025-3-31 23:01 作者: Cardioversion 時(shí)間: 2025-4-1 03:57
Approximation by Durrmeyer Type Operators Preserving Linear Functions,In the present article, we propose a new sequence of linear positive operators having different basis, which are generalizations of Bernstein basis functions. We establish some convergence estimates which include link convergence, asymptotic formula, and direct estimates in terms of usual and Ditzian–Totik modulus of continuity.