Ollinger, Nicolas (ed.) Mathematical informatics. A photography in 2015. (Informatique mathématique. Une photographie en 2015.) (French) Zbl 1398.94012 Paris: CNRS Éditions (ISBN 978-2-271-08791-1/pbk). vii, 252 p. (2015). MSC: 94-06 68-06 94A15 68Q01 00A09 00B15 PDFBibTeX XMLCite \textit{N. Ollinger} (ed.), Informatique mathématique. Une photographie en 2015. Paris: CNRS Éditions (2015; Zbl 1398.94012)
Beutelspacher, Albrecht Cryptology. An introduction to the science of encoding, concealing and hiding. 10th updated edition. (Kryptologie. Eine Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.) (German) Zbl 1395.94001 Wiesbaden: Springer Spektrum (ISBN 978-3-658-05975-0/pbk; 978-3-658-05976-7/ebook). xvii, 187 p. (2015). MSC: 94-01 94A60 94A62 94A55 PDFBibTeX XMLCite \textit{A. Beutelspacher}, Kryptologie. Eine Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. 10th updated edition. Wiesbaden: Springer Spektrum (2015; Zbl 1395.94001) Full Text: DOI
Liew, Soung Chang; Lu, Lu; Zhang, Shengli A primer on physical-layer network coding. (English) Zbl 1370.94001 Synthesis Lectures on Communication Networks 16. San Rafael, CA: Morgan & Claypool Publishers (ISBN 978-162-705-091-3/pbk; 978-162-705-092-0/ebook). xv, 202 p. (2015). MSC: 94-01 94A05 94A12 94A15 PDFBibTeX XMLCite \textit{S. C. Liew} et al., A primer on physical-layer network coding. San Rafael, CA: Morgan \& Claypool Publishers (2015; Zbl 1370.94001) Full Text: DOI
Schneier, Bruce [Diffie, Whitfield] Applied cryptography. Protocols, algorithms and source code in C. 20th anniversary edition. With a foreword by Whitfield Diffie. Reprint of the 1996 2nd edition. (English) Zbl 1364.94009 Hoboken, NJ: John Wiley & Sons (ISBN 978-1-119-09672-6/hbk; 978-0-471-11709-4/pbk). xxv, 758 p. (2015). MSC: 94-02 01A75 94A60 68P25 PDFBibTeX XMLCite \textit{B. Schneier}, Applied cryptography. Protocols, algorithms and source code in C. 20th anniversary edition. With a foreword by Whitfield Diffie. Reprint of the 1996 2nd edition. Hoboken, NJ: John Wiley \& Sons (2015; Zbl 1364.94009)
Ogiela, Marek R.; Hachaj, Tomasz Natural user interfaces in medical image analysis. Cognitive analysis of brain and carotid artery images. (English) Zbl 1358.92005 Advances in Computer Vision and Pattern Recognition. Cham: Springer (ISBN 978-3-319-07799-4/hbk; 978-3-319-37700-1/pbk; 978-3-319-07800-7/ebook). xii, 288 p. (2015). MSC: 92-02 92C55 94A08 PDFBibTeX XMLCite \textit{M. R. Ogiela} and \textit{T. Hachaj}, Natural user interfaces in medical image analysis. Cognitive analysis of brain and carotid artery images. Cham: Springer (2015; Zbl 1358.92005) Full Text: DOI
Coluccia, Giulio; Ravazzi, Chiara; Magli, Enrico Compressed sensing for distributed systems. (English) Zbl 1357.94003 SpringerBriefs in Electrical and Computer Engineering. Signal Processing. Singapore: Springer (ISBN 978-981-287-389-7/pbk; 978-981-287-390-3/ebook). x, 97 p. (2015). MSC: 94-06 94A12 68M14 PDFBibTeX XMLCite \textit{G. Coluccia} et al., Compressed sensing for distributed systems. Singapore: Springer (2015; Zbl 1357.94003) Full Text: DOI
Chen, Yanjiao; Zhang, Qian Dynamic spectrum auction in wireless communication. (English) Zbl 1357.94001 SpringerBriefs in Electrical and Computer Engineering. Cham: Springer (ISBN 978-3-319-14029-2/pbk; 978-3-319-14030-8/ebook). ix, 58 p. (2015). MSC: 94-02 94A05 94A12 91B26 91B18 PDFBibTeX XMLCite \textit{Y. Chen} and \textit{Q. Zhang}, Dynamic spectrum auction in wireless communication. Cham: Springer (2015; Zbl 1357.94001) Full Text: DOI
Fan, Bin; Wang, Zhenhua; Wu, Fuchao Local image descriptor: modern approaches. (English) Zbl 1351.68004 SpringerBriefs in Computer Science. Berlin: Springer (ISBN 978-3-662-49171-3/pbk; 978-3-662-49173-7/ebook). xii, 99 p. (2015). MSC: 68-02 94-02 68T45 94A08 PDFBibTeX XMLCite \textit{B. Fan} et al., Local image descriptor: modern approaches. Berlin: Springer (2015; Zbl 1351.68004) Full Text: DOI
Yan, Song Y. Quantum computational number theory. (English) Zbl 1361.11005 Cham: Springer (ISBN 978-3-319-25821-8/hbk; 978-3-319-25823-2/ebook). ix, 252 p. (2015). Reviewer: Mihai Cipu (Bucureşti) MSC: 11-02 11Yxx 81P68 94A60 PDFBibTeX XMLCite \textit{S. Y. Yan}, Quantum computational number theory. Cham: Springer (2015; Zbl 1361.11005) Full Text: DOI
Mery, Domingo Computer vision for X-ray testing. Imaging, systems, image databases, and algorithms. (English) Zbl 1349.94002 Cham: Springer (ISBN 978-3-319-20746-9/hbk; 978-3-319-37202-0/pbk; 978-3-319-20747-6/ebook). xxiv, 347 p. (2015). MSC: 94-02 94A08 92C55 68T45 68W40 PDFBibTeX XMLCite \textit{D. Mery}, Computer vision for X-ray testing. Imaging, systems, image databases, and algorithms. Cham: Springer (2015; Zbl 1349.94002) Full Text: DOI
Neuhäuser, David Werner Parametric approximation formulas for the distributions of cost functionals in spatial stochastic networks. (English) Zbl 1348.62004 Ulm: Univ. Ulm, Fakultät für Mathematik und Wirtschaftswissenschaften (Diss.). viii, 182 p. (2015). MSC: 62-02 60D05 05C80 05C10 62E17 62H10 62H11 94A05 94C99 PDFBibTeX XMLCite \textit{D. W. Neuhäuser}, Parametric approximation formulas for the distributions of cost functionals in spatial stochastic networks. Ulm: Univ. Ulm, Fakultät für Mathematik und Wirtschaftswissenschaften (Diss.) (2015; Zbl 1348.62004)
Hartung, Salke Efficient range-free Monte-Carlo-localization for mobile wireless sensor networks. (English) Zbl 1409.94814 Göttingen: Univ. Göttingen (Diss.). xiv, 189 p. (2015). MSC: 94A12 94-02 68M10 PDFBibTeX XMLCite \textit{S. Hartung}, Efficient range-free Monte-Carlo-localization for mobile wireless sensor networks. Göttingen: Univ. Göttingen (Diss.) (2015; Zbl 1409.94814) Full Text: Link Link
Beinert, Robert Ambiguities in one-dimensional phase retrieval from Fourier magnitudes. (English) Zbl 1416.94004 Göttingen: Univ. Göttingen (Diss.). viii, 240 (2015). MSC: 94-02 94A12 42A38 PDFBibTeX XMLCite \textit{R. Beinert}, Ambiguities in one-dimensional phase retrieval from Fourier magnitudes. Göttingen: Univ. Göttingen (Diss.) (2015; Zbl 1416.94004) Full Text: Link Link
Lopes, Bruno (ed.); Perciano, Talita (ed.) Learning and inferring. Festschrift for Alejandro C. Frery on the occasion of his 55th birthday. (English) Zbl 1345.94004 Tributes 26. London: College Publications (ISBN 978-1-84890-171-1). v, 165 p. (2015). MSC: 94-06 94A08 94A12 94A15 PDFBibTeX XMLCite \textit{B. Lopes} (ed.) and \textit{T. Perciano} (ed.), Learning and inferring. Festschrift for Alejandro C. Frery on the occasion of his 55th birthday. London: College Publications (2015; Zbl 1345.94004)
Nielsen, Frank (ed.); Barbaresco, Frédéric (ed.) Geometric science of information. Second international conference, GSI 2015, Palaiseau, France, October 28–30, 2015. Proceedings. (English) Zbl 1334.94028 Lecture Notes in Computer Science 9389. Cham: Springer (ISBN 978-3-319-25039-7/pbk; 978-3-319-25040-3/ebook). xxii, 790 p. (2015). MSC: 94-06 94A08 94A12 94A15 94A17 00B25 PDFBibTeX XMLCite \textit{F. Nielsen} (ed.) and \textit{F. Barbaresco} (ed.), Geometric science of information. Second international conference, GSI 2015, Palaiseau, France, October 28--30, 2015. Proceedings. Cham: Springer (2015; Zbl 1334.94028) Full Text: DOI
Puente León, Fernando; Jäkel, Holger Signals and systems. 6th revised edition. (Signale und Systeme.) (German) Zbl 1341.94001 De Gruyter Studium. Berlin: De Gruyter/Oldenbourg (ISBN 978-3-11-040385-5/pbk; 978-3-11-040386-2/ebook). xiii, 542 p. (2015). Reviewer: Olaf Ninnemann (Berlin) MSC: 94-01 94A12 00A06 42A38 42C40 44A10 44A15 65Txx PDFBibTeX XMLCite \textit{F. Puente León} and \textit{H. Jäkel}, Signale und Systeme. 6th revised edition. Berlin: De Gruyter/Oldenbourg (2015; Zbl 1341.94001) Full Text: DOI
Iwata, Tetsu (ed.); Cheon, Jung Hee (ed.) Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. (English) Zbl 1334.94027 Lecture Notes in Computer Science 9452. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). xxv, 810 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{T. Iwata} (ed.) and \textit{J. H. Cheon} (ed.), Advances in cryptology -- ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 -- December 3, 2015. Proceedings. Part I. Berlin: Springer (2015; Zbl 1334.94027) Full Text: DOI
von zur Gathen, Joachim CryptoSchool. (English) Zbl 1350.94006 Berlin: Springer (ISBN 978-3-662-48423-4/hbk; 978-3-662-48425-8/ebook). 888 p. (2015). Reviewer: Wilfried Meidl (Linz) MSC: 94-01 94-03 94A60 94A62 11T71 14G50 68P25 81P68 PDFBibTeX XMLCite \textit{J. von zur Gathen}, CryptoSchool. Berlin: Springer (2015; Zbl 1350.94006) Full Text: DOI
Tohyama, Mikio Waveform analysis of sound. (English) Zbl 1345.76001 Mathematics for Industry 3. Tokyo: Springer (ISBN 978-4-431-54423-4/hbk; 978-4-431-54424-1/ebook). xv, 229 p. (2015). Reviewer: Qian Zuwen (Beijing) MSC: 76-02 76Q05 94A12 00A79 PDFBibTeX XMLCite \textit{M. Tohyama}, Waveform analysis of sound. Tokyo: Springer (2015; Zbl 1345.76001) Full Text: DOI
Edelev, Sviatoslav Towards a lightweight, secure, and untraceable RFID authentication protocol. (English) Zbl 1333.94003 Göttingen: Univ. Göttingen (Diss.). vii, 92 p. (2015). MSC: 94-02 94A60 94A62 PDFBibTeX XMLCite \textit{S. Edelev}, Towards a lightweight, secure, and untraceable RFID authentication protocol. Göttingen: Univ. Göttingen (Diss.) (2015; Zbl 1333.94003) Full Text: Link Link
Nyberg, Kaisa (ed.) Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. (English) Zbl 1331.94005 Lecture Notes in Computer Science 9048. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). xiii, 508 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. Nyberg} (ed.), Topics in cryptology -- CT-RSA 2015. The cryptographer's track at the RSA conference 2015, San Francisco, CA, USA, April 20--24, 2015. Proceedings. Cham: Springer (2015; Zbl 1331.94005) Full Text: DOI
Liu, Feng; Yan, Wei Qi Visual cryptography for image processing and security. Theory, methods, and applications. 2nd edition. (English) Zbl 1330.68009 Cham: Springer (ISBN 978-3-319-23472-4/hbk; 978-3-319-23473-1/ebook). xvi, 167 p. (2015). MSC: 68-02 94-02 68P25 68U10 94A60 94A62 PDFBibTeX XMLCite \textit{F. Liu} and \textit{W. Q. Yan}, Visual cryptography for image processing and security. Theory, methods, and applications. 2nd edition. Cham: Springer (2015; Zbl 1330.68009) Full Text: DOI
Das, Debaprasad VLSI design. 2nd edition. (English) Zbl 1333.94002 Oxford Higher Education. Oxford: Oxford University Press (ISBN 978-0-19-809486-9/pbk; 978-1-68015-871-7/ebook). xix, 626 p. (2015). MSC: 94-02 94A05 94C15 68R10 PDFBibTeX XMLCite \textit{D. Das}, VLSI design. 2nd edition. Oxford: Oxford University Press (2015; Zbl 1333.94002)
Starck, Jean-Luc; Murtagh, Fionn; Fadili, Jalal M. Sparse image and signal processing. Wavelets and related geometric multiscale analysis. 2nd updated edition. (English) Zbl 1335.94003 Cambridge: Cambridge University Press (ISBN 978-1-107-08806-1/hbk; 978-1-316-10451-4/ebook). xix, 428 p. (2015). MSC: 94-02 94A08 94A12 94A20 65T60 65F22 PDFBibTeX XMLCite \textit{J.-L. Starck} et al., Sparse image and signal processing. Wavelets and related geometric multiscale analysis. 2nd updated edition. Cambridge: Cambridge University Press (2015; Zbl 1335.94003) Full Text: DOI
Jiang, Yufei; Zhu, Xu; Lim, Eng Gee; Huang, Yi; Lin, Hai Semi-blind Carrier frequency offset estimation and channel equalization. (English) Zbl 1328.94002 SpringerBriefs in Electrical and Computer Engineering. Cham: Springer (ISBN 978-3-319-24982-7/pbk; 978-3-319-24984-1/ebook). x, 87 p. (2015). MSC: 94-02 94A40 94A05 PDFBibTeX XMLCite \textit{Y. Jiang} et al., Semi-blind Carrier frequency offset estimation and channel equalization. Cham: Springer (2015; Zbl 1328.94002) Full Text: DOI
Rieß, Bernhard; Wallraff, Christoph Workbook: Signals and systems. Problems and solutions. (Übungsbuch Signale und Systeme. Aufgaben und Lösungen.) (German) Zbl 1372.94001 Wiesbaden: Springer Vieweg (ISBN 978-3-658-10879-3/pbk; 978-3-658-10880-9/ebook). viii, 125 p. (2015). MSC: 94-01 94A12 00A07 PDFBibTeX XMLCite \textit{B. Rieß} and \textit{C. Wallraff}, Übungsbuch Signale und Systeme. Aufgaben und Lösungen. Wiesbaden: Springer Vieweg (2015; Zbl 1372.94001) Full Text: DOI
Malkin, Tal (ed.); Kolesnikov, Vladimir (ed.); Lewko, Allison Bishop (ed.); Polychronakis, Michalis (ed.) Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. (English) Zbl 1331.94004 Lecture Notes in Computer Science 9092. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). xviii, 698 p. (2015). MSC: 94-06 68-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{T. Malkin} (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2--5, 2015. Revised selected papers. Cham: Springer (2015; Zbl 1331.94004) Full Text: DOI
Iwata, Tetsu (ed.); Cheon, Jung Hee (ed.) Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. (English) Zbl 1327.94002 Lecture Notes in Computer Science 9453. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). xxv, 802 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{T. Iwata} (ed.) and \textit{J. H. Cheon} (ed.), Advances in cryptology -- ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 -- December 3, 2015. Proceedings. Part II. Berlin: Springer (2015; Zbl 1327.94002) Full Text: DOI
Delfs, Hans; Knebl, Helmut Introduction to cryptography. Principles and applications. 3rd edition. (English) Zbl 1333.94001 Information Security and Cryptography. Berlin: Springer (ISBN 978-3-662-47973-5/hbk; 978-3-662-47974-2/ebook). xx, 508 p. (2015). Reviewer: Olaf Ninnemann (Berlin) MSC: 94-01 94A60 68P25 81P94 PDFBibTeX XMLCite \textit{H. Delfs} and \textit{H. Knebl}, Introduction to cryptography. Principles and applications. 3rd edition. Berlin: Springer (2015; Zbl 1333.94001) Full Text: DOI
Schönlieb, Carola-Bibiane Partial differential equation methods for image inpainting. (English) Zbl 1335.94002 Cambridge Monographs on Applied and Computational Mathematics 29. Cambridge: Cambridge University Press (ISBN 978-1-107-00100-8/hbk; 978-0-511-73430-4/ebook). x, 254 p. (2015). MSC: 94-02 35-02 94A08 68U10 PDFBibTeX XMLCite \textit{C.-B. Schönlieb}, Partial differential equation methods for image inpainting. Cambridge: Cambridge University Press (2015; Zbl 1335.94002) Full Text: DOI
Chen, Liqun (ed.); Matsuo, Shin’ichiro (ed.) Security standardisation research. Second international conference, SSR 2015, Tokyo, Japan, December 15–16, 2015. Proceedings. (English) Zbl 1351.94002 Lecture Notes in Computer Science 9497. Cham: Springer (ISBN 978-3-319-27151-4/pbk; 978-3-319-27152-1/ebook). x, 265 p. (2015). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{L. Chen} (ed.) and \textit{S. Matsuo} (ed.), Security standardisation research. Second international conference, SSR 2015, Tokyo, Japan, December 15--16, 2015. Proceedings. Cham: Springer (2015; Zbl 1351.94002) Full Text: DOI
Groth, Jens (ed.) Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. (English) Zbl 1326.94007 Lecture Notes in Computer Science 9496. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). x, 329 p. (2015). MSC: 94-06 94A60 94Bxx 00B25 PDFBibTeX XMLCite \textit{J. Groth} (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15--17, 2015. Proceedings. Cham: Springer (2015; Zbl 1326.94007) Full Text: DOI
Biryukov, Alex (ed.); Goyal, Vipul (ed.) Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. (English) Zbl 1326.94005 Lecture Notes in Computer Science 9462. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). xx, 371 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{A. Biryukov} (ed.) and \textit{V. Goyal} (ed.), Progress in cryptology -- INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6--9, 2015. Proceedings. Cham: Springer (2015; Zbl 1326.94005) Full Text: DOI
Au, Man-Ho (ed.); Miyaji, Atsuko (ed.) Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. (English) Zbl 1326.94004 Lecture Notes in Computer Science 9451. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). xix, 504 p. (2015). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{M.-H. Au} (ed.) and \textit{A. Miyaji} (ed.), Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24--26, 2015. Proceedings. Cham: Springer (2015; Zbl 1326.94004) Full Text: DOI
Wagner, Sven Optimizing tCS and TMS multi-sensor setups using realistic head models. (English) Zbl 1327.92004 Münster: Univ. Münster, Mathematisch-Naturwissenschaftliche Fakultät, Fachbereich Mathematik und Informatik (Diss.). xi, 183 p. (2015). MSC: 92-02 92C55 92C50 94A08 PDFBibTeX XMLCite \textit{S. Wagner}, Optimizing tCS and TMS multi-sensor setups using realistic head models. Münster: Univ. Münster, Mathematisch-Naturwissenschaftliche Fakultät, Fachbereich Mathematik und Informatik (Diss.) (2015; Zbl 1327.92004)
Reiter, Michael (ed.); Naccache, David (ed.) Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10–12, 2015. Proceedings. (English) Zbl 1325.68022 Lecture Notes in Computer Science 9476. Cham: Springer (ISBN 978-3-319-26822-4/pbk; 978-3-319-26823-1/ebook). x, 257 p. (2015). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{M. Reiter} (ed.) and \textit{D. Naccache} (ed.), Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10--12, 2015. Proceedings. Cham: Springer (2015; Zbl 1325.68022) Full Text: DOI
Tokareva, Natalia Bent functions. Results and applications to cryptography. (English) Zbl 1372.94002 Amsterdam: Elsevier/Academic Press (ISBN 978-0-12-802318-1/pbk; 978-0-12-802555-0/ebook). xviii, 202 p. (2015). Reviewer: Wilfried Meidl (Linz) MSC: 94-02 94A60 94D10 06E30 PDFBibTeX XMLCite \textit{N. Tokareva}, Bent functions. Results and applications to cryptography. Amsterdam: Elsevier/Academic Press (2015; Zbl 1372.94002) Full Text: Link
Csiszár, Imre; Körner, János Information theory. Coding theorems for discrete memoryless systems. 2nd edition, reprint of the 2011 hardback edition. (English) Zbl 1323.94002 Cambridge: Cambridge University Press (ISBN 978-1-107-56504-3/pbk; 978-0-511-92188-9/ebook). xxi, 499 p. (2015). MSC: 94-02 94A15 94A17 94A24 94A29 94A34 94A40 PDFBibTeX XMLCite \textit{I. Csiszár} and \textit{J. Körner}, Information theory. Coding theorems for discrete memoryless systems. 2nd edition, reprint of the 2011 hardback edition. Cambridge: Cambridge University Press (2015; Zbl 1323.94002) Full Text: DOI
Rodríguez, Leonardo Jiménez; Tran, Nghi; Le-Ngoc, Tho Amplify-and-forward relaying in wireless communications. (English) Zbl 1350.94009 SpringerBriefs in Computer Science. Cham: Springer (ISBN 978-3-319-17980-3/pbk; 978-3-319-17981-0/ebook). xiv, 122 p. (2015). Reviewer: Jozef Woźniak (Gdańsk) MSC: 94-02 94A05 68M10 90B18 PDFBibTeX XMLCite \textit{L. J. Rodríguez} et al., Amplify-and-forward relaying in wireless communications. Cham: Springer (2015; Zbl 1350.94009) Full Text: DOI
Magnor, Marcus A.; Grau, Oliver; Sorkine-Hornung, Olga; Theobalt, Christian Digital representations of the real world. How to capture, model, and render visual reality. (English) Zbl 1323.68011 Boca Raton, FL: CRC Press (ISBN 978-1-4822-4381-9/hbk; 978-1-4822-4382-6/ebook). xxvi, 431 p. (2015). MSC: 68-06 68U05 68U10 94A08 00A66 00B15 PDFBibTeX XMLCite \textit{M. A. Magnor} et al., Digital representations of the real world. How to capture, model, and render visual reality. Boca Raton, FL: CRC Press (2015; Zbl 1323.68011) Full Text: DOI
Sundararajan, D. Discrete wavelet transform. A signal processing approach. (English) Zbl 1327.94001 Hoboken, NJ: John Wiley & Sons (ISBN 978-1-119-04606-6/hbk). xi, 323 p. (2015). Reviewer: Manfred Tasche (Rostock) MSC: 94-01 94A12 65T60 94A08 PDFBibTeX XMLCite \textit{D. Sundararajan}, Discrete wavelet transform. A signal processing approach. Hoboken, NJ: John Wiley \& Sons (2015; Zbl 1327.94001)
Siddiqi, Abul Hasan (ed.); Manchanda, Pammy (ed.); Bhardwaj, Rashmi (ed.) Mathematical models, methods and applications. Papers based on invited and contributory talks given at the 11th international biennial conference on emerging mathematical methods, models and algorithms for science and technology, Greater Noida, India, December 15–16, 2012. (English) Zbl 1336.94005 Industrial and Applied Mathematics. Singapore: Springer (ISBN 978-981-287-971-4/hbk; 978-981-287-973-8/ebook). xix, 298 p. (2015). MSC: 94-06 94A08 94A60 68U10 00A69 00B25 PDFBibTeX XMLCite \textit{A. H. Siddiqi} (ed.) et al., Mathematical models, methods and applications. Papers based on invited and contributory talks given at the 11th international biennial conference on emerging mathematical methods, models and algorithms for science and technology, Greater Noida, India, December 15--16, 2012. Singapore: Springer (2015; Zbl 1336.94005) Full Text: DOI
Bodei, Chiara (ed.); Ferrari, Gian-Luigi (ed.); Priami, Corrado (ed.) Programming languages with applications to biology and security. Essays dedicated to Pierpaolo Degano on the occasion of his 65th birthday. (English) Zbl 1325.68011 Lecture Notes in Computer Science 9465. Cham: Springer (ISBN 978-3-319-25526-2/pbk; 978-3-319-25527-9/ebook). xii, 375 p. (2015). MSC: 68-06 68M12 68N15 68N30 68Q55 68Q85 92C42 94A60 94A62 00B30 PDFBibTeX XMLCite \textit{C. Bodei} (ed.) et al., Programming languages with applications to biology and security. Essays dedicated to Pierpaolo Degano on the occasion of his 65th birthday. Cham: Springer (2015; Zbl 1325.68011) Full Text: DOI
Reeds, James A. (ed.); Diffie, Whitfield (ed.); Field, J. V. (ed.); Good, I. J. (ed.); Michie, D. (ed.); Timms, G. (ed.) Breaking teleprinter ciphers at Bletchley Park. An edition of I. J. Good, D. Michie and G. Timms: General Report on Tunny with emphasis on statistical methods (1945). With introductions and notes by the authors. (English) Zbl 1347.94002 Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons (ISBN 978-0-470-46589-9/hbk; 978-1-119-06160-1/ebook). cxi, 673 p. (2015). Reviewer: Marek Grajek (Poznań) MSC: 94-03 94A60 01A60 11T71 00A09 97P20 01A05 62C12 62F15 46N30 62-03 62-04 PDFBibTeX XMLCite \textit{J. A. Reeds} (ed.) et al., Breaking teleprinter ciphers at Bletchley Park. An edition of I. J. Good, D. Michie and G. Timms: General Report on Tunny with emphasis on statistical methods (1945). With introductions and notes by the authors. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons (2015; Zbl 1347.94002) Full Text: DOI
Brincker, Rune; Ventura, Carlos E. Introduction to operational modal analysis. (English) Zbl 1337.74001 Hoboken, NJ: John Wiley & Sons (ISBN 978-1-119-96315-8/hbk; 978-1-118-53514-1/ebook). xii, 360 p. (2015). Reviewer: Prabhat Kumar Mahanti (Saint John) MSC: 74-01 94-01 74H45 94A12 74-04 74S60 PDFBibTeX XMLCite \textit{R. Brincker} and \textit{C. E. Ventura}, Introduction to operational modal analysis. Hoboken, NJ: John Wiley \& Sons (2015; Zbl 1337.74001) Full Text: DOI
Chakraborty, Subhra (ed.); Schwabe, Peter (ed.); Solworth, Jon (ed.) Security, privacy, and applied cryptography engineering. 5th international conference, SPACE 2015, Jaipur, India, October 3–7, 2015. Proceedings. (English) Zbl 1325.94008 Lecture Notes in Computer Science 9354. Cham: Springer (ISBN 978-3-319-24125-8/pbk; 978-3-319-24126-5/pbk). xviii, 373 p. (2015). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{S. Chakraborty} (ed.) et al., Security, privacy, and applied cryptography engineering. 5th international conference, SPACE 2015, Jaipur, India, October 3--7, 2015. Proceedings. Cham: Springer (2015; Zbl 1325.94008) Full Text: DOI
Beshaj, Lubjana (ed.); Shaska, Tony (ed.); Zhupa, Eustrat (ed.) Advances on superelliptic curves and their applications. Based on the NATO Advanced Study Institute (ASI), Ohrid, Macedonia, 2014. (English) Zbl 1326.14003 NATO Science for Peace and Security Series D: Information and Communication Security 41. Amsterdam: IOS Press (ISBN 978-1-61499-519-7/hbk; 978-1-61499-520-3/ebook). xii, 375 p. (2015). MSC: 14-06 14H52 14H55 14H45 14H40 14H25 14G05 14G40 11Gxx 11T71 00B25 PDFBibTeX XMLCite \textit{L. Beshaj} (ed.) et al., Advances on superelliptic curves and their applications. Based on the NATO Advanced Study Institute (ASI), Ohrid, Macedonia, 2014. Amsterdam: IOS Press (2015; Zbl 1326.14003) Full Text: arXiv Link
Niederreiter, Harald; Winterhof, Arne Applied number theory. (English) Zbl 1328.11001 Cham: Springer (ISBN 978-3-319-22320-9/hbk; 978-3-319-22321-6/ebook). x, 442 p. (2015). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 11-01 11T71 11K45 94A60 94B05 11Z05 PDFBibTeX XMLCite \textit{H. Niederreiter} and \textit{A. Winterhof}, Applied number theory. Cham: Springer (2015; Zbl 1328.11001) Full Text: DOI
Feeman, Timothy G. The mathematics of medical imaging. A beginner’s guide. 2nd edition. (English) Zbl 1351.92002 Springer Undergraduate Texts in Mathematics and Technology. Cham: Springer (ISBN 978-3-319-22664-4/hbk; 978-3-319-33107-2/pbk; 978-3-319-22665-1/ebook). xiv, 197 p. (2015). Reviewer: Witold Pedrycz (Edmonton) MSC: 92-01 92C55 94A08 44A12 PDFBibTeX XMLCite \textit{T. G. Feeman}, The mathematics of medical imaging. A beginner's guide. 2nd edition. Cham: Springer (2015; Zbl 1351.92002) Full Text: DOI
Brenner, Michael (ed.); Christin, Nicolas (ed.); Johnson, Benjamin (ed.); Rohloff, Kurt (ed.) Financial cryptography and data security. FC 2015 international workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015. Revised selected papers. (English) Zbl 1321.94006 Lecture Notes in Computer Science 8976. Berlin: Springer (ISBN 978-3-662-48050-2/pbk; 978-3-662-48051-9/ebook). xii, 309 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{M. Brenner} (ed.) et al., Financial cryptography and data security. FC 2015 international workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015. Revised selected papers. Berlin: Springer (2015; Zbl 1321.94006) Full Text: DOI
Beutelspacher, Albrecht; Schwenk, Jörg; Wolfenstetter, Klaus-Dieter Modern processing of cryptography. From RSA to zero-knowledge. 8th revised edition. (Moderne Verfahren der Kryptographie. Von RSA zu Zero-Knowledge.) (German) Zbl 1320.94003 Heidelberg: Springer Spektrum (ISBN 978-3-8348-1927-7/pbk; 978-3-8348-2322-9/ebook). xv, 186 p. (2015). MSC: 94-01 94A60 94A62 PDFBibTeX XMLCite \textit{A. Beutelspacher} et al., Moderne Verfahren der Kryptographie. Von RSA zu Zero-Knowledge. 8th revised edition. Heidelberg: Springer Spektrum (2015; Zbl 1320.94003) Full Text: DOI
Güneysu, Tim (ed.); Handschuh, Helena (ed.) Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. (English) Zbl 1343.68011 Lecture Notes in Computer Science 9293. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). xiv, 704 p. (2015). MSC: 68-06 94-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{T. Güneysu} (ed.) and \textit{H. Handschuh} (ed.), Cryptographic hardware and embedded systems -- CHES 2015. 17th international workshop, Saint-Malo, France, September 13--16, 2015. Proceedings. Berlin: Springer (2015; Zbl 1343.68011) Full Text: DOI
Tanaka, Keisuke (ed.); Suga, Yuji (ed.) Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. (English) Zbl 1346.68017 Lecture Notes in Computer Science 9241. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). xiii, 357 p. (2015). MSC: 68-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{K. Tanaka} (ed.) and \textit{Y. Suga} (ed.), Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26--28, 2015. Proceedings. Cham: Springer (2015; Zbl 1346.68017) Full Text: DOI
Cuppens, Frédéric (ed.); Garcia-Alfaro, Joaquin (ed.); Zincir Heywood, Nur (ed.); Fong, L. (ed.) Foundations and practice of security. 7th international symposium, FPS 2014, Montreal, QC, Canada, November 3–5, 2014. Revised selected papers. (English) Zbl 1335.94005 Lecture Notes in Computer Science 8930. Cham: Springer (ISBN 978-3-319-17039-8/pbk; 978-3-319-17040-4/ebook). xiii, 375 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{F. Cuppens} (ed.) et al., Foundations and practice of security. 7th international symposium, FPS 2014, Montreal, QC, Canada, November 3--5, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1335.94005) Full Text: DOI
Aranha, F. (ed.); Menezes, Alfred (ed.) Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. (English) Zbl 1319.94001 Lecture Notes in Computer Science 8895. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). xii, 387 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{F. Aranha} (ed.) and \textit{A. Menezes} (ed.), Progress in cryptology -- LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17--19, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1319.94001) Full Text: DOI
Lin, Dongdai (ed.); Yung, Moti (ed.); Zhou, Jianying (ed.) Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. (English) Zbl 1319.94006 Lecture Notes in Computer Science 8957. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). xiii, 547 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{D. Lin} (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13--15, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1319.94006) Full Text: DOI
Leander, Gregor (ed.) Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. (English) Zbl 1318.68029 Lecture Notes in Computer Science 9054. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). xi, 600 p. (2015). MSC: 68-06 94-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{G. Leander} (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers. Berlin: Springer (2015; Zbl 1318.68029) Full Text: DOI
Cid, Carlos (ed.); Rechberger, Christian (ed.) Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. (English) Zbl 1318.68013 Lecture Notes in Computer Science 8540. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). xi, 636 p. (2015). MSC: 68-06 94-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{C. Cid} (ed.) and \textit{C. Rechberger} (ed.), Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3--5, 2014. Revised selected papers. Berlin: Springer (2015; Zbl 1318.68013) Full Text: DOI
Katz, Jonathan (ed.) Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. (English) Zbl 1318.94002 Lecture Notes in Computer Science 9020. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). xiv, 824 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{J. Katz} (ed.), Public-key cryptography -- PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015. Proceedings. Berlin: Springer (2015; Zbl 1318.94002) Full Text: DOI
Lee, Jooyoung (ed.); Kim, Jongsung (ed.) Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. (English) Zbl 1318.68031 Lecture Notes in Computer Science 8949. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). xiii, 448 p. (2015). MSC: 68-06 94-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{J. Lee} (ed.) and \textit{J. Kim} (ed.), Information security and cryptology -- ICISC 2014. 17th international conference, Seoul, South Korea, December 3--5, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1318.68031) Full Text: DOI
Eisenbarth, Thomas (ed.); Öztürk, Erdinç (ed.) Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. (English) Zbl 1318.94001 Lecture Notes in Computer Science 8898. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). xiii, 169 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{T. Eisenbarth} (ed.) and \textit{E. Öztürk} (ed.), Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1--2, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1318.94001) Full Text: DOI
Aujol, Jean-François (ed.); Nikolova, Mila (ed.); Papadakis, Nicolas (ed.) Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. (English) Zbl 1362.68008 Lecture Notes in Computer Science 9087. Cham: Springer (ISBN 978-3-319-18460-9/pbk; 978-3-319-18461-6/ebook). xv, 716 p. (2015). MSC: 68-06 68T45 94A08 00B25 PDFBibTeX XMLCite \textit{J.-F. Aujol} (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 -- June 4, 2015. Proceedings. Cham: Springer (2015; Zbl 1362.68008) Full Text: DOI
Lehmann, Anja (ed.); Wolf, Stefan (ed.) Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. (English) Zbl 1321.94009 Lecture Notes in Computer Science 9063. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). xiv, 297 p. (2015). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{A. Lehmann} (ed.) and \textit{S. Wolf} (ed.), Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2--5, 2015. Proceedings. Cham: Springer (2015; Zbl 1321.94009) Full Text: DOI
Oswald, Elisabeth (ed.); Fischlin, Marc (ed.) Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. (English) Zbl 1321.94011 Lecture Notes in Computer Science 9057. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). xviii, 838 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{E. Oswald} (ed.) and \textit{M. Fischlin} (ed.), Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II. Berlin: Springer (2015; Zbl 1321.94011) Full Text: DOI
Oswald, Elisabeth (ed.); Fischlin, Marc (ed.) Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. (English) Zbl 1321.94010 Lecture Notes in Computer Science 9056. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). xvii, 818 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{E. Oswald} (ed.) and \textit{M. Fischlin} (ed.), Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I. Berlin: Springer (2015; Zbl 1321.94010) Full Text: DOI
Lopez, Javier (ed.); Wu, Yongdong (ed.) Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. (English) Zbl 1350.68014 Lecture Notes in Computer Science 9065. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). xiv, 576 p. (2015). MSC: 68-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{J. Lopez} (ed.) and \textit{Y. Wu} (ed.), Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5--8, 2015. Proceedings. Cham: Springer (2015; Zbl 1350.68014) Full Text: DOI
Lauter, Kristin (ed.); Rodríguez-Henríquez, Francisco (ed.) Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. (English) Zbl 1319.94004 Lecture Notes in Computer Science 9230. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). xii, 385 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. Lauter} (ed.) and \textit{F. Rodríguez-Henríquez} (ed.), Progress in cryptology -- LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23--26, 2015. Proceedings. Cham: Springer (2015; Zbl 1319.94004) Full Text: DOI
Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus Secure multiparty computation and secret sharing. (English) Zbl 1322.68003 Cambridge: Cambridge University Press (ISBN 978-1-107-04305-3/hbk; 978-1-107-33775-6/ebook). x, 373 p. (2015). Reviewer: Adrian Atanasiu (Bucureşti) MSC: 68-01 68-02 94-01 94-02 68P25 68M12 94A60 94A62 PDFBibTeX XMLCite \textit{R. Cramer} et al., Secure multiparty computation and secret sharing. Cambridge: Cambridge University Press (2015; Zbl 1322.68003) Full Text: DOI
El Hajji, Said (ed.); Nitaj, Abderrahmane (ed.); Carlet, Claude (ed.); Souidi, El Mamoun (ed.) Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. (English) Zbl 1316.68010 Lecture Notes in Computer Science 9084. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). xxv, 375 p. (2015). MSC: 68-06 94-06 68P25 68P30 94A60 94Bxx 00B25 00B30 PDFBibTeX XMLCite \textit{S. El Hajji} (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26--28, 2015. Proceedings -- in honor of Thierry Berger. Cham: Springer (2015; Zbl 1316.68010) Full Text: DOI
Hui, K. (ed.); Qing, H. (ed.); Shi, Elaine (ed.); Yiu, M. (ed.) Information and communications security. 16th international conference, ICICS 2014, Hong Kong, China, December 16–17, 2014. Revised selected papers. (English) Zbl 1331.68014 Lecture Notes in Computer Science 8958. Cham: Springer (ISBN 978-3-319-21965-3/pbk; 978-3-319-21966-0/ebook). x, 321 p. (2015). MSC: 68-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{K. Hui} (ed.) et al., Information and communications security. 16th international conference, ICICS 2014, Hong Kong, China, December 16--17, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1331.68014) Full Text: DOI
Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. (English) Zbl 1319.94003 Lecture Notes in Computer Science 9216. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). xviii, 783 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Gennaro} (ed.) and \textit{M. Robshaw} (ed.), Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part II. Berlin: Springer (2015; Zbl 1319.94003) Full Text: DOI
Gennaro, Rosario (ed.); Robshaw, Matthew (ed.) Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. (English) Zbl 1319.94002 Lecture Notes in Computer Science 9215. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). xviii, 787 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Gennaro} (ed.) and \textit{M. Robshaw} (ed.), Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part I. Berlin: Springer (2015; Zbl 1319.94002) Full Text: DOI
Slinko, Arkadii Algebra for applications. Cryptography, secret sharing, error-correcting, fingerprinting, compression. (English) Zbl 1345.94002 Springer Undergraduate Mathematics Series. Cham: Springer (ISBN 978-3-319-21950-9/pbk; 978-3-319-21951-6/ebook). xiv, 328 p. (2015). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94-01 00A06 11-01 12-01 20-01 94A60 94Bxx PDFBibTeX XMLCite \textit{A. Slinko}, Algebra for applications. Cryptography, secret sharing, error-correcting, fingerprinting, com\-pression. Cham: Springer (2015; Zbl 1345.94002) Full Text: DOI
Lahyane, Mustapha (ed.); Martínez-Moro, Edgar (ed.) Algebra for secure and reliable communication modeling. Proceedings of the CIMPA research school and conference, Morelia, Mexico, October 1–13, 2012. (English) Zbl 1320.14003 Contemporary Mathematics 642. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (RSME) (ISBN 978-1-4704-1018-6/pbk; 978-1-4704-2566-1/ebook). xiii, 240 p. (2015). MSC: 14-06 14G50 11T71 94B27 94B40 00B25 PDFBibTeX XMLCite \textit{M. Lahyane} (ed.) and \textit{E. Martínez-Moro} (ed.), Algebra for secure and reliable communication modeling. Proceedings of the CIMPA research school and conference, Morelia, Mexico, October 1--13, 2012. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (RSME) (2015; Zbl 1320.14003) Full Text: DOI
Böhme, Rainer (ed.); Okamoto, Tatsuaki (ed.) Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015. Revised selected papers. (English) Zbl 1317.94002 Lecture Notes in Computer Science 8975. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). xiv, 574 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{R. Böhme} (ed.) and \textit{T. Okamoto} (ed.), Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26--30, 2015. Revised selected papers. Berlin: Springer (2015; Zbl 1317.94002) Full Text: DOI
Mangard, Stefan (ed.); Poschmann, Y. (ed.) Constructive side-channel analysis and secure design. 6th international workshop, COSADE 2015, Berlin, Germany, April 13–14, 2015. Revised selected papers. (English) Zbl 1346.94004 Lecture Notes in Computer Science 9064. Cham: Springer (ISBN 978-3-319-21475-7/pbk; 978-3-319-21476-4/ebook). x, 271 p. (2015). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{S. Mangard} (ed.) and \textit{Y. Poschmann} (ed.), Constructive side-channel analysis and secure design. 6th international workshop, COSADE 2015, Berlin, Germany, April 13--14, 2015. Revised selected papers. Cham: Springer (2015; Zbl 1346.94004) Full Text: DOI
Ors, Berna (ed.); Preneel, Bart (ed.) Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. (English) Zbl 1316.94003 Lecture Notes in Computer Science 9024. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). x, 251 p. (2015). MSC: 94-06 68-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{B. Ors} (ed.) and \textit{B. Preneel} (ed.), Cryptography and information security in the Balkans. First international conference, BalkanCryptSec~2014, Istanbul, Turkey, October 16--17, 2014. Revised selected papers. Cham: Springer (2015; Zbl 1316.94003) Full Text: DOI
Hooda, D. S.; Raich, Vivek Fuzzy information measures with applications. (English) Zbl 1325.94051 Oxford: Alpha Science International (ISBN 978-1-84265-934-2/hbk). ix, 236 p., not consecutively paged. (2015). Reviewer: Antonín Dvořák (Ostrava) MSC: 94A17 68T37 94-02 68-02 03E72 94D05 PDFBibTeX XMLCite \textit{D. S. Hooda} and \textit{V. Raich}, Fuzzy information measures with applications. Oxford: Alpha Science International (2015; Zbl 1325.94051)
Pfander, Götz E. (ed.) Sampling theory, a renaissance. Compressive sensing and other developments. (English) Zbl 1336.94004 Applied and Numerical Harmonic Analysis. Cham: Birkhäuser/Springer (ISBN 978-3-319-19748-7/hbk; 978-3-319-19749-4/ebook). xiv, 532 p. (2015). MSC: 94-06 94A05 94A12 94A08 00B15 PDFBibTeX XMLCite \textit{G. E. Pfander} (ed.), Sampling theory, a renaissance. Compressive sensing and other developments. Cham: Birkhäuser/Springer (2015; Zbl 1336.94004) Full Text: DOI
Balan, Radu (ed.); Begué, Matthew (ed.); Benedetto, John J. (ed.); Czaja, Wojciech (ed.); Okoudjou, Kasso A. (ed.) Excursions in harmonic analysis, Volume 4. The February Fourier talks at the Norbert Wiener Center, College Park, MD, USA, 2002–2013. (English) Zbl 1357.42001 Applied and Numerical Harmonic Analysis. Cham: Birkhäuser/ Springer (ISBN 978-3-319-20187-0/hbk; 978-3-319-20188-7/ebook). xviii, 428 p. (2015). MSC: 42-06 42C15 94A12 62D05 00B25 PDFBibTeX XMLCite \textit{R. Balan} (ed.) et al., Excursions in harmonic analysis, Volume 4. The February Fourier talks at the Norbert Wiener Center, College Park, MD, USA, 2002--2013. Cham: Birkhäuser/Springer (2015; Zbl 1357.42001) Full Text: DOI
Dirks, Hendrik Meinert Variational methods for joint motion estimation and image reconstruction. (English) Zbl 1321.68002 Münster: Univ. Münster, Mathematisch-Naturwissenschaftliche Fakultät, Fachbereich Mathematik und Informatik (Diss.). 245 p. (2015). Reviewer: Wiesław Kotarski (Sosnowiec) MSC: 68-02 49M99 68U10 92C55 94A08 PDFBibTeX XMLCite \textit{H. M. Dirks}, Variational methods for joint motion estimation and image reconstruction. Münster: Univ. Münster, Mathematisch-Naturwissenschaftliche Fakultät, Fachbereich Mathematik und Informatik (Diss.). (2015; Zbl 1321.68002)
Vujović, Igor Multiresolution approach to processing images for different applications. Interaction of lower processing with higher vision. (English) Zbl 1420.94023 SpringerBriefs in Electrical and Computer Engineering. Cham: Springer (ISBN 978-3-319-14456-6/pbk; 978-3-319-14457-3/ebook). xiii, 58 p. (2015). MSC: 94A08 94-02 92C55 PDFBibTeX XMLCite \textit{I. Vujović}, Multiresolution approach to processing images for different applications. Interaction of lower processing with higher vision. Cham: Springer (2015; Zbl 1420.94023) Full Text: DOI
Foo, Ernest (ed.); Stebila, Douglas (ed.) Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. (English) Zbl 1314.94007 Lecture Notes in Computer Science 9144. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). xi, 510 p. (2015). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{E. Foo} (ed.) and \textit{D. Stebila} (ed.), Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015. Proceedings. Cham: Springer (2015; Zbl 1314.94007) Full Text: DOI
Gao, Fei (ed.); Shi, Kuangyu (ed.); Li, Shuo (ed.) Computational methods for molecular imaging. (English) Zbl 1322.92001 Lecture Notes in Computational Vision and Biomechanics 22. Cham: Springer (ISBN 978-3-319-18430-2/hbk; 978-3-319-18431-9/ebook). vii, 205 p. (2015). MSC: 92-02 92C55 94A12 92C40 PDFBibTeX XMLCite \textit{F. Gao} (ed.) et al., Computational methods for molecular imaging. Cham: Springer (2015; Zbl 1322.92001) Full Text: DOI
Krim, Hamid; Ben Hamza, Abdessamad Geometric methods in signal and image analysis. (English) Zbl 1329.00010 Cambridge: Cambridge University Press (ISBN 978-1-107-03390-0/hbk; 978-1-139-52396-7/ebook). xiv, 284 p. (2015). MSC: 00A05 00A06 15-01 20-01 53-01 57-01 55-01 94A12 94A08 PDFBibTeX XMLCite \textit{H. Krim} and \textit{A. Ben Hamza}, Geometric methods in signal and image analysis. Cambridge: Cambridge University Press (2015; Zbl 1329.00010) Full Text: DOI
Czumaj, Artur (ed.); Georgakopoulos, Agelos (ed.); Král’, Daniel (ed.); Lozin, Vadim (ed.); Pikhurko, Oleg (ed.) Surveys in combinatorics 2015. Papers based on the 25th British combinatorial conference, University of Warwick, Coventry, UK, July 6–10, 2015. (English) Zbl 1348.05003 London Mathematical Society Lecture Note Series 424. Cambridge: Cambridge University Press (ISBN 978-1-107-46250-2/pbk; 978-1-316-10685-3/ebook). vii, 324 p. (2015). MSC: 05-06 05Cxx 05D10 11T71 00B25 PDFBibTeX XMLCite \textit{A. Czumaj} (ed.) et al., Surveys in combinatorics 2015. Papers based on the 25th British combinatorial conference, University of Warwick, Coventry, UK, July 6--10, 2015. Cambridge: Cambridge University Press (2015; Zbl 1348.05003) Full Text: DOI
Eldar, Yonina C. Sampling theory. Beyond bandlimited systems. (English) Zbl 1332.94002 Cambridge: Cambridge University Press (ISBN 978-1-107-00339-2/hbk; 978-0-511-76232-1/ebook). xxv, 810 p. (2015). MSC: 94-01 94A20 PDFBibTeX XMLCite \textit{Y. C. Eldar}, Sampling theory. Beyond bandlimited systems. Cambridge: Cambridge University Press (2015; Zbl 1332.94002) Full Text: DOI
Mann, Robert B. Black holes: thermodynamics, information, and firewalls. (English) Zbl 1314.83005 SpringerBriefs in Physics. Cham: Springer (ISBN 978-3-319-14495-5/pbk; 978-3-319-14496-2/ebook). vi, 97 p. (2015). MSC: 83-02 83C57 94Axx PDFBibTeX XMLCite \textit{R. B. Mann}, Black holes: thermodynamics, information, and firewalls. Cham: Springer (2015; Zbl 1314.83005) Full Text: DOI
Cariolaro, Gianfranco Quantum communications. (English) Zbl 1323.81002 Signals and Communication Technology. Cham: Springer (ISBN 978-3-319-15599-9/hbk; 978-3-319-15600-2/ebook). xxi, 673 p. (2015). Reviewer: Gisbert Janßen (München) MSC: 81-01 94-01 81V80 94A12 81P45 68U35 90C40 94A05 81P68 68Q12 81P40 81P70 94A24 81P15 PDFBibTeX XMLCite \textit{G. Cariolaro}, Quantum communications. Cham: Springer (2015; Zbl 1323.81002) Full Text: DOI
Ballet, Stéphane (ed.); Perret, Marc (ed.); Zaytsev, Alexey (ed.) Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3–7, 2013. Proceedings. (English) Zbl 1317.11007 Contemporary Mathematics 637. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-1461-0/pbk; 978-1-4704-2339-1/ebook). v, 306 p. (2015). MSC: 11-06 11G10 11G20 11H71 11T71 14G05 14G15 94B27 00B25 PDFBibTeX XMLCite \textit{S. Ballet} (ed.) et al., Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3--7, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS) (2015; Zbl 1317.11007) Full Text: DOI
Gollmer, Sebastian T. [Buzug, Thorsten M.] 3D image segmentation using statistical shape models. Discovery of correspondence, modeling, segmentation and their alternating dependencies. With a foreword by Thorsten M. Buzug. (3D-Bildsegmentierung mittels statistischer Formmodelle. Korrespondenzfindung, Modellierung, Segmentierung und ihre wechselseitigen Abhängigkeiten. Mit einem Geleitwort von Prof. Dr. Thorsten M. Buzug.) (German) Zbl 1314.92007 Aktuelle Forschung Medizintechnik – Latest Research in Medical Engineering. Wiesbaden: Springer Vieweg (ISBN 978-3-658-09810-0/pbk; 978-3-658-09811-7/ebook). xiv, 183 p. (2015). MSC: 92-02 92C55 94A08 62P10 PDFBibTeX XMLCite \textit{S. T. Gollmer}, 3D-Bildsegmentierung mittels statistischer Formmodelle. Korrespondenzfindung, Modellierung, Segmentierung und ihre wechselseitigen Abhängigkeiten. Mit einem Geleitwort von Prof. Dr. Thorsten M. Buzug. Wiesbaden: Springer Vieweg (2015; Zbl 1314.92007) Full Text: DOI
Daras, Nicholas J. (ed.); Rassias, Michael Th. (ed.) Computation, cryptography, and network security. (English) Zbl 1329.94003 Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). ix, 756 p. (2015). MSC: 94-06 94A60 94C30 94B40 68M10 68R10 68T05 00B15 PDFBibTeX XMLCite \textit{N. J. Daras} (ed.) and \textit{M. Th. Rassias} (ed.), Computation, cryptography, and network security. Cham: Springer (2015; Zbl 1329.94003) Full Text: DOI
Dahlke, Stephan (ed.); De Mari, Filippo (ed.); Grohs, Philipp (ed.); Labate, Demetrio (ed.) Harmonic and applied analysis. From groups to signals. (English) Zbl 1329.42001 Applied and Numerical Harmonic Analysis. Cham: Birkhäuser/Springer (ISBN 978-3-319-18862-1/hbk; 978-3-319-18863-8/ebook). xv, 258 p. (2015). MSC: 42-06 42B35 42C15 44A15 65T60 22D10 22E30 94A12 00B15 PDFBibTeX XMLCite \textit{S. Dahlke} (ed.) et al., Harmonic and applied analysis. From groups to signals. Cham: Birkhäuser/Springer (2015; Zbl 1329.42001) Full Text: DOI
Richter, Mathias Inverse Problems. Basics, theory and applied examples. (Inverse Probleme. Grundlagen, Theorie und Anwendungsbeispiele.) (German) Zbl 1331.65083 Mathematik im Fokus. Heidelberg: Springer Spektrum (ISBN 978-3-662-45810-5/pbk; 978-3-662-45811-2/ebook). ix, 128 p. (2015). Reviewer: Robert Plato (Siegen) MSC: 65J22 65-01 65L08 65L09 65Z05 00A69 00A06 65R32 65R30 65R10 44A12 45B05 45D05 65T50 65J20 47A52 47J06 94A12 92C55 65M32 65N21 PDFBibTeX XMLCite \textit{M. Richter}, Inverse Probleme. Grundlagen, Theorie und Anwendungsbeispiele. Heidelberg: Springer Spektrum (2015; Zbl 1331.65083) Full Text: DOI
Chakraborty, Mihir K. (ed.); Skowron, Andrzej (ed.); Maiti, Manoranjan (ed.); Kar, Samarjit (ed.) Facets of uncertainties and applications. ICFUA, Kolkata, India, December 2013. Proceedings of the conference. (English) Zbl 1319.90004 Springer Proceedings in Mathematics & Statistics 125. New Delhi: Springer (ISBN 978-81-322-2300-9/hbk; 978-81-322-2301-6/ebook). xiv, 343 p. (2015). MSC: 90-06 90Bxx 93Exx 93C42 03B52 68U35 94A05 94A08 94A12 00B25 PDFBibTeX XMLCite \textit{M. K. Chakraborty} (ed.) et al., Facets of uncertainties and applications. ICFUA, Kolkata, India, December 2013. Proceedings of the conference. New Delhi: Springer (2015; Zbl 1319.90004) Full Text: DOI
Choimet, D.; Queffélec, H. [Godefroy, Gilles] Twelve landmarks of twentieth-century analysis. With a foreword by Gilles Godefroy. Translated from the French by Danièle Gibbons and Greg Gibbons. (English) Zbl 1325.00006 Cambridge: Cambridge University Press (ISBN 978-1-107-65034-3/pbk; 978-1-107-05945-0/hbk). xv, 508 p. (2015). Reviewer: Bernd Bank MSC: 00A05 01A60 11T23 11T24 26A27 30H05 33E99 40E05 42A05 42C20 46B09 46B25 46J15 46J20 54E52 PDFBibTeX XMLCite \textit{D. Choimet} and \textit{H. Queffélec}, Twelve landmarks of twentieth-century analysis. With a foreword by Gilles Godefroy. Translated from the French by Danièle Gibbons and Greg Gibbons. Cambridge: Cambridge University Press (2015; Zbl 1325.00006) Full Text: DOI
Berlekamp, Elwyn R. Algebraic coding theory. Revised ed. (English) Zbl 1320.94001 Hackensack, NJ: World Scientific (ISBN 978-981-4635-89-9/hbk; 978-981-4635-91-2/ebook). xxiv, 474 p. (2015). Reviewer: Olaf Ninnemann (Berlin) MSC: 94-01 94Bxx 11Y16 11T06 01A75 PDFBibTeX XMLCite \textit{E. R. Berlekamp}, Algebraic coding theory. Revised ed. Hackensack, NJ: World Scientific (2015; Zbl 1320.94001) Full Text: DOI
Kizza, Joseph Migga Guide to computer network security. 3rd updated ed. (English) Zbl 1311.68005 Computer Communications and Networks. London: Springer (ISBN 978-1-4471-6653-5/hbk; 978-1-4471-6654-2/ebook). xxii, 545 p. (2015). MSC: 68-01 68M10 68P25 94A60 PDFBibTeX XMLCite \textit{J. M. Kizza}, Guide to computer network security. 3rd updated ed. London: Springer (2015; Zbl 1311.68005) Full Text: DOI
Das, Apurba Guide to signals and patterns in image processing. Foundations, methods and applications. (English) Zbl 1311.68004 Cham: Springer (ISBN 978-3-319-14171-8/hbk; 978-3-319-14172-5/ebook). xxiv, 416 p. (2015). MSC: 68-01 94-01 68T45 68U10 94A08 PDFBibTeX XMLCite \textit{A. Das}, Guide to signals and patterns in image processing. Foundations, methods and applications. Cham: Springer (2015; Zbl 1311.68004) Full Text: DOI
Schäffler, Stefan Mathematics of information. Theory and applications of Shannon-Wiener information. (Mathematik der Information. Theorie und Anwendungen der Shannon-Wiener Information.) (German) Zbl 1395.94003 Springer-Lehrbuch Masterclass. Heidelberg: Springer Spektrum (ISBN 978-3-662-46381-9/pbk; 978-3-662-46382-6/ebook). xv, 160 p. (2015). Reviewer: Guy Jumarie (Montréal) MSC: 94-01 94A15 94A24 81P94 PDFBibTeX XMLCite \textit{S. Schäffler}, Mathematik der Information. Theorie und Anwendungen der Shannon-Wiener Information. Heidelberg: Springer Spektrum (2015; Zbl 1395.94003) Full Text: DOI