Mathematical Logic Products

  • Mathematical Foundations of Public Key Cryptography

    By Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xiammeng Meng

    Based on the research experience of the authors, this book provides a theoretical structure of fundamental number theory algebra knowledge supporting public-key cryptography. The authors integrate the results and thinking from more than 20 years of research and teaching, bridging the gap between…

    Hardback – 2015-10-22 
    CRC Press

  • Multilevel Modeling of Secure Systems in QoP-ML

    By Bogdan Księżopolski

    In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and…

    Hardback – 2015-06-09
    Auerbach Publications

  • Group Theoretic Cryptography

    By Maria Isabel González Vasco, Rainer Steinwandt

    Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential…

    Hardback – 2015-03-31
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Application of Fuzzy Logic to Social Choice Theory

    By John N. Mordeson, Davender S. Malik, Terry D. Clark

    Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences. Filling this gap, Application of Fuzzy Logic to Social Choice Theory provides a comprehensive study of fuzzy social choice…

    Hardback – 2015-03-02
    Chapman and Hall/CRC
    Monographs and Research Notes in Mathematics

  • Practical Cryptography

    Algorithms and Implementations Using C++

    Edited by Saiful Azad, Al-Sakib Khan Pathan

    Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an…

    Hardback – 2014-11-16
    Auerbach Publications

  • Introduction to Modern Cryptography, Second Edition

    By Jonathan Katz, Yehuda Lindell

    Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of…

    Hardback – 2014-11-05
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with…

    Hardback – 2014-10-28
    Chapman and Hall/CRC

  • How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking…

    Hardback – 2014-01-16
    Auerbach Publications

  • Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between…

    Hardback – 2013-12-13
    Chapman and Hall/CRC

  • Introduction to Computer and Network Security

    Navigating Shades of Gray

    By Richard R. Brooks

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical…

    Hardback – 2013-08-18
    Chapman and Hall/CRC

  • Distributed Networks

    Intelligence, Security, and Applications

    Edited by Qurban A. Memon

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,…

    Hardback – 2013-07-21
    CRC Press

  • Unauthorized Access

    The Crisis in Online Privacy and Security

    By Robert H. Sloan, Richard Warner

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in…

    Paperback – 2013-07-14
    CRC Press

Product Search