18
Views
0
CrossRef citations to date
0
Altmetric
Articles

A study of prime numbers distribution based on support vector domain description

Pages 865-882 | Received 01 Apr 2020, Published online: 05 Feb 2021

References

  • W. Diffie and M. Hellman. “New directions in cryptography”. IEEE transactions on Information Theory, Vol. 22, N°. 6, pp. 644-654, 1976. doi: 10.1109/TIT.1976.1055638
  • R. Rivest, A. Shamir, and L. Adleman. “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, N°. 2, pp.120-126, 1978. doi: 10.1145/359340.359342
  • R-C. Merkle. “Secure Communications Over Insecure Channels”, Communications of the ACM, Vol. 21, N°. 4, pp. 294-299, 1978 doi: 10.1145/359460.359473
  • N. Koblitz. “Elliptic curve cryptosystems”. Mathematics of computation, Vol. 48, pp. 203-209, 1987 doi: 10.1090/S0025-5718-1987-0866109-5
  • V. Miller. “Use of elliptic curves in cryptography”. In H. Williams, editor, Advances in Cryptology, Proc. Crypto 85, Vol. 218 of Lecture Notes in Computer Science, pp. 417-426. Springer-Verlag, 1987
  • T. ElGamal. “A public key cryptosystem and a signature scheme based on discrete logarithms”. IEEE transactions on information theory, Vol. 31, N°. 4, pp.469-472. 1985. doi: 10.1109/TIT.1985.1057074
  • V.N. Vapnik. “The Nature of Statistical Learning Theory”. Springer Verlag, New York (1995)
  • M. El boujnouni, M. Jedra, and N. Zahid. “New malware detection framework based on N-grams and Support Vector Domain Description”, In Proceedings of the 11th International Conference on Information Assurance and Security (IAS), Marrakesh, Morocco, 14-16 Dec. 2015.
  • S.H. Bokhari. “Multiprocessing the sieve of Eratosthenes”. IEEE Computer, Vol. 20, N°. 4, pp. 50-58, 1987. doi: 10.1109/MC.1987.1663535
  • M. El boujnouni, M. Jedra, and N. Zahid. “Email Spam filtering using the combination of two improved versions of Support Vector Domain Description”, In Proceedings of the 10th International Conference on Computational Intelligence in Security for Information Systems (CIS-IS15), International Joint Conference Advances in Intelligent Systems and Computing Volume 369, pages 99-109, Burgos, Spain, 15-17 June, 2015.
  • DMJ. Tax and RPW. Duin. “Support vector domain description”, Pattern Recognition Letters, Vol. 20, N°. 11-13, pp. 1191-1199, 1999, doi: 10.1016/S0167-8655(99)00087-2
  • P. Wang, G. Mao. “Describing Data with the Support Vector Shell in Distributed Environments”. In: Perner P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2010. Lecture Notes in Computer Science, vol 6171. Springer, Berlin, Heidelberg.
  • J. Havil. “Exploring Euler’s Constant”. Princeton University Press, pp. 266, 2003.
  • D. Zagier. “Newman’s Short Proof of the Prime Number Theorem”, The American Mathematical Monthly, Vol. 104, No. 8, pp. 705-708, 1997. doi: 10.1080/00029890.1997.11990704
  • L. J. Goldstein, “A History of the Prime Number Theorem”, The American Mathematical Monthly, Vol. 80, No. 6, pp. 599-615, 1973. doi: 10.1080/00029890.1973.11993338
  • M. El boujnouni, M. Jedra, and N. Zahid, “New malware detection framework based on N-grams and SVDD with SMO”, Journal of Information Assurance and Security, Vol. 11, N°. 4, pp. 223-232, 2016.
  • P. Sundarayya & G. Vara Prasad “A public key cryptosystem using Affine Hill Cipher under modulation of prime number”, Journal of Information and Optimization Sciences, Vol. 40, No. 4, pp 919-930, 2019. doi: 10.1080/02522667.2018.1470751
  • L.S. Hill, “Cryptography in an Algebraic Alphabet,” American Mathematical Monthly, Vol.36, No.6, pp.306-312, 1929. doi: 10.1080/00029890.1929.11986963

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.