Mathematical Logic Products

  • Multilevel Modeling of Secure Systems in QoP-ML

    By Bogdan Księżopolski

    In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and…

    Paperback – 2017-08-01 
    Auerbach Publications

  • Multiple-Base Number System

    Theory and Applications

    By Vassil Dimitrov, Graham Jullien, Roberto Muscedere

    Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily…

    Paperback – 2017-04-06
    CRC Press
    Circuits and Electrical Engineering

  • Visual Cryptography and Secret Image Sharing

    Edited by Stelvio Cimato, Ching-Nung Yang

    With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a…

    Paperback – 2017-03-29
    CRC Press
    Digital Imaging and Computer Vision

  • Distributed Networks

    Intelligence, Security, and Applications

    Edited by Qurban A. Memon

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,…

    Paperback – 2017-03-29
    CRC Press

  • Elements of Quasigroup Theory and Applications

    By Victor Shcherbacov

    This book provides an introduction to quasigroup theory along with new structural results on some of the quasigroup classes. Many results are presented with some of them from mathematicians of the former USSR. These included results have not been published before in the western mathematical…

    Hardback – 2017-03-17
    Chapman and Hall/CRC
    Chapman & Hall/CRC Monographs and Research Notes in Mathematics

  • Guide to Pairing-Based Cryptography

    Edited by Nadia El Mrabet, Marc Joye

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite…

    Hardback – 2016-12-08
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Security for Wireless Sensor Networks using Identity-Based Cryptography

    By Harsh Kupwade Patil, Stephen A. Szygenda

    Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack…

    Paperback – 2016-12-01
    Auerbach Publications

  • Noiseless Steganography

    The Key to Covert Communications

    By Abdelrahman Desoky

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the…

    Paperback – 2016-11-16
    Auerbach Publications

  • Introduction to Coding Theory, Second Edition

    By Jurgen Bierbrauer

    This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary…

    Hardback – 2016-10-10
    Chapman and Hall/CRC
    Discrete Mathematics and Its Applications

  • Electromagnetic Compatibility

    Methods, Analysis, Circuits, and Measurement, Third Edition

    By David A. Weston

    Shelving Guide: Electrical Engineering Revised, updated, and expanded, Electromagnetic Compatibility: Methods, Analysis, Circuits, and Measurement, Third Edition provides comprehensive practical coverage of the design, problem solving, and testing of electromagnetic compatibility (EMC) in…

    Hardback – 2016-09-29
    CRC Press

  • Routledge Revivals: On Constructive Interpretation of Predictive Mathematics (1990)

    By Charles Parsons

    First published in 1990, this book consists of a detailed exposition of results of the theory of "interpretation" developed by G. Kreisel — the relative impenetrability of which gives the elucidation contained here great value for anyone seeking to understand his work. It contains more complex…

    Hardback – 2016-08-08
    Routledge

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with…

    Hardback – 2016-05-13
    Chapman and Hall/CRC

Product Search