Overview
Part of the book series: Communications in Computer and Information Science (CCIS, volume 834)
Included in the following conference series:
Conference proceedings info: ICMC 2018.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes the proceedings of the 4th International Conference on Mathematics and Computing, ICMC 2018, held in Varanasi, India, in January 2018.
The 29 papers presented in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections on security and coding theory; computing; applied mathematics; pure mathematics.
Similar content being viewed by others
Keywords
- mobile and wireless security
- encryption
- symmetric cryptography
- security
- Boolean function
- cryptanalysis and attacks
- intrusion
- neural network
- cellular automata
- support vector machines
- image encryption
- machine learning
- block-colorings
- biometric recognition
- numerical methods
- fuzzy sets
- rough sets and optimization
Table of contents (29 papers)
-
Security and Coding Theory
-
Computing
-
Applied Mathematics
Other volumes
-
Mathematics and Computing
-
Mathematics and Computing
Editors and Affiliations
Bibliographic Information
Book Title: Mathematics and Computing
Book Subtitle: 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers
Editors: Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh
Series Title: Communications in Computer and Information Science
DOI: https://doi.org/10.1007/978-981-13-0023-3
Publisher: Springer Singapore
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Singapore Pte Ltd. 2018
Softcover ISBN: 978-981-13-0022-6Published: 14 April 2018
eBook ISBN: 978-981-13-0023-3Published: 13 April 2018
Series ISSN: 1865-0929
Series E-ISSN: 1865-0937
Edition Number: 1
Number of Pages: XIX, 325
Number of Illustrations: 84 b/w illustrations
Topics: Mathematics of Computing, Security