The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and …
This book presents theories and the main useful techniques of the Finite Element Method (FEM), with an introduction to FEM and many case studies of its use in engineering practice. It supports engineers and students to solve primarily linear problems in mechanical engineering, with a main focus on static and dynamic structural problems. Readers of this text are encouraged to discover the pro…
This book constitutes the refereed proceedings of the 18th International Conference on Theory and Applications of Satisfiability Testing, SAT 2015, held in Austin, TX, USA, in September 2015. The 21 regular papers, 2 short papers and 7 tool papers presented together with 3 invited talks were carefully reviewed and selected from 70 submissions. The papers address different aspects of SAT, includ…
This book constitutes the refereed proceedings of the 12th Annual Conference on Theory and Applications of Models of Computation, TAMC 2014, held in Singapore, in May 2015. The 35 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers treat all topics relating to the theory and applications of models computation, for example recursion theory and mathe…
EACM is a comprehensive reference work covering the vast field of applied and computational mathematics. Applied mathematics itself accounts for at least 60 per cent of mathematics, and the emphasis on computation reflects the current and constantly growing importance of computational methods in all areas of applications. EACM emphasizes the strong links of applied mathematics with major areas …