Mathematical Logic Products

  • Security for Wireless Sensor Networks using Identity-Based Cryptography

    By Harsh Kupwade Patil, Stephen A. Szygenda

    Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack…

    Paperback – 2016-09-30 
    Auerbach Publications

  • Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured…

    Paperback – 2016-09-30 
    CRC Press

  • Noiseless Steganography

    The Key to Covert Communications

    By Abdelrahman Desoky

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the…

    Paperback – 2016-09-30 
    Auerbach Publications

  • Electromagnetic Compatibility

    Methods, Analysis, Circuits, and Measurement, Third Edition

    By David A. Weston

    This book provides basic theory of Electromagnetic Compatibility using simple equations expressed as magnitudes with worked examples. Applications and examples are described simply with numerous sketches and are useful for non specialist electronic engineers and technicians. EMC/EMI analysis,…

    Hardback – 2016-09-28 
    CRC Press

  • Introduction to Coding Theory, Second Edition

    By Jurgen Bierbrauer

    This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary…

    Hardback – 2016-09-15 
    Chapman and Hall/CRC
    Discrete Mathematics and Its Applications

  • Routledge Revivals: On Constructive Interpretation of Predictive Mathematics (1990)

    By Charles Parsons

    First published in 1990, this book consists of a detailed exposition of results of the theory of "interpretation" developed by G. Kreisel — the relative impenetrability of which gives the elucidation contained here great value for anyone seeking to understand his work. It contains more complex…

    Hardback – 2016-08-08
    Routledge

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with…

    Hardback – 2016-05-13
    Chapman and Hall/CRC

  • Mathematical Foundations of Public Key Cryptography

    By Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng

    In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and…

    Hardback – 2015-10-21
    CRC Press

  • Multilevel Modeling of Secure Systems in QoP-ML

    By Bogdan Ksiezopolski

    In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and…

    Hardback – 2015-06-10
    Auerbach Publications

  • Group Theoretic Cryptography

    By Maria Isabel Gonzalez Vasco, Rainer Steinwandt

    Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential…

    Hardback – 2015-04-01
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Application of Fuzzy Logic to Social Choice Theory

    By John N. Mordeson, Davender S. Malik, Terry D. Clark

    Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences. Filling this gap, Application of Fuzzy Logic to Social Choice Theory provides a comprehensive study of fuzzy social choice…

    Hardback – 2015-03-03
    Chapman and Hall/CRC
    Monographs and Research Notes in Mathematics

  • Practical Cryptography

    Algorithms and Implementations Using C++

    Edited by Saiful Azad, Al-Sakib Khan Pathan

    Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an…

    Hardback – 2014-11-17
    Auerbach Publications

Product Search