↓ Skip to main content

Computation, Cryptography, and Network Security

Overview of attention for book
Cover of 'Computation, Cryptography, and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Transformations of Cryptographic Schemes Through Interpolation Techniques
  3. Altmetric Badge
    Chapter 2 Flaws in the Initialisation Process of Stream Ciphers
  4. Altmetric Badge
    Chapter 3 Producing Fuzzy Inclusion and Entropy Measures
  5. Altmetric Badge
    Chapter 4 On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses
  6. Altmetric Badge
    Chapter 5 On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Study
  7. Altmetric Badge
    Chapter 6 Security and Formation of Network-Centric Operations
  8. Altmetric Badge
    Chapter 7 A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security
  9. Altmetric Badge
    Chapter 8 Integral Estimates for the Composition of Green’s and Bounded Operators
  10. Altmetric Badge
    Chapter 9 A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory
  11. Altmetric Badge
    Chapter 10 On Geometry of the Zeros of a Polynomial
  12. Altmetric Badge
    Chapter 11 Approximation by Durrmeyer Type Operators Preserving Linear Functions
  13. Altmetric Badge
    Chapter 12 Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves
  14. Altmetric Badge
    Chapter 13 Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces
  15. Altmetric Badge
    Chapter 14 Threshold Secret Sharing Through Multivariate Birkhoff Interpolation
  16. Altmetric Badge
    Chapter 15 Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants
  17. Altmetric Badge
    Chapter 16 A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
  18. Altmetric Badge
    Chapter 17 A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies
  19. Altmetric Badge
    Chapter 18 Quantum Analogues of Hermite–Hadamard Type Inequalities for Generalized Convexity
  20. Altmetric Badge
    Chapter 19 A Digital Signature Scheme Based on Two Hard Problems
  21. Altmetric Badge
    Chapter 20 Randomness in Cryptography
  22. Altmetric Badge
    Chapter 21 Current Challenges for IT Security with Focus on Biometry
  23. Altmetric Badge
    Chapter 22 Generalizations of Entropy and Information Measures
  24. Altmetric Badge
    Chapter 23 Maximal and Variational Principles in Vector Spaces
  25. Altmetric Badge
    Chapter 24 A function which does not have any single-fold Diophantine representation and conjecturally equals {(1,1)} \cup {(n,2^(2^(n-2))): n \in {2,3,4,...}}
  26. Altmetric Badge
    Chapter 25 Image Encryption Scheme Based on Non-autonomous Chaotic Systems
  27. Altmetric Badge
    Chapter 26 Multiple Parameterize Yang-Hilbert-Type Integral Inequalities
  28. Altmetric Badge
    Chapter 27 Parameterized Yang–Hilbert-Type Integral Inequalities and Their Operator Expressions
  29. Altmetric Badge
    Chapter 28 A Secure Communication Design Based on the Chaotic Logistic Map: An Experimental Realization Using Arduino Microcontrollers
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

news
1 news outlet
twitter
4 X users
googleplus
1 Google+ user
q&a
2 Q&A threads

Citations

dimensions_citation
9 Dimensions

Readers on

mendeley
53 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computation, Cryptography, and Network Security
Published by
Springer, December 2015
DOI 10.1007/978-3-319-18275-9
ISBNs
978-3-31-918274-2, 978-3-31-918275-9
Authors

Zapateiro De La Hoz, Mauricio Fabian, Acho Zuppa, Leonardo, Vidal Seguí, Yolanda

Editors

Nicholas J. Daras, Michael Th. Rassias

X Demographics

X Demographics

The data shown below were collected from the profiles of 4 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 53 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 53 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 11 21%
Student > Master 5 9%
Researcher 4 8%
Student > Bachelor 4 8%
Professor 3 6%
Other 11 21%
Unknown 15 28%
Readers by discipline Count As %
Computer Science 18 34%
Engineering 4 8%
Business, Management and Accounting 4 8%
Social Sciences 2 4%
Agricultural and Biological Sciences 2 4%
Other 5 9%
Unknown 18 34%