Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.
The volume features both original research and survey papers contributed by experts from the international community. The book has a strong interdisciplinary flavor and features the most recent developments in the topics treated.
This useful reference text benefits professionals, researchers, academics and graduate students.
Contents:
ℵ-structures: One-way Actions via Holomorphs and Split Extensions with Cryptographic Applications (Iris Anshel, Dorian Goldfeld, and Paul E Gunnells)Using Blockchains to Support Supply Chain Security (Ioannis T Christou, Sofoklis Efremidis, Giannis Klian, Gerasimos C Meletiou, and Michael Th Rassias)Consecutive Square-Free Numbers [nc tanθ(log n)], [nc tanθ(log n)] + 1 (Stoyan Ivanov Dimitrov)Inequalities for (m, M)-𝜓-Convex Functions with Applications to Operator Noncommutative Perspectives (Silvestru Sever Dragomir)Product Subset Problem: Applications to Number Theory and Cryptography (Konstantinos A Draziotis, Vasileios Martidis, and Stratos Tiganourias)Cotangent Sums Related to Riemann Hypothesis (Mouloud Goubi)The Approximation of Inverse Functions of Dirichlet Series by Rational Functions (Johann Franke)Topological Data Analysis and Clustering (Dimitrios Panagopoulos)Qualitative Queries with Fuzzy Techniques (Konstantinos A Raftopoulos and Nikolaos K Papadakis)General DKH Contractions in Metric Spaces (Mihai Turinici)Cryptographic Properties of Boolean Functions Generating Similar de Bruijn Sequences (Andreas Varelias, Konstantinos Limniotis, and Nicholas Kolokotronis)
Readership: Researchers, professionals, academics, and graduate students in information sciences, digital security, computer maths & science and theoretical computer science.
Comments