Secure communications based on discrete time chaotic systems
Fiorella Argenti, A. De Angeli, E. Del Re, Roberto Genesio, Plinio Pagni, Alberto Tesi (1997)
Kybernetika
Similarity:
Fiorella Argenti, A. De Angeli, E. Del Re, Roberto Genesio, Plinio Pagni, Alberto Tesi (1997)
Kybernetika
Similarity:
Cari, Elmer P.T., Theodoro, Edson A.R., Mijolaro, Ana P., Bretas, Newton G., Alberto, Luis F.C. (2009)
Mathematical Problems in Engineering
Similarity:
Eisencraft, Marcio, Fanganiello, Renato D., Baccala, Luiz A. (2009)
Mathematical Problems in Engineering
Similarity:
dos Santos, Ângela Maria, Lopes, Sérgio Roberto, Viana, Ricardo Luiz (2009)
Mathematical Problems in Engineering
Similarity:
Ryszard Makowski, Robert Hossa (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
Ryszard Makowski, Robert Hossa (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
Miroslav L. Dukić, Zoran S. Dobrosavljević (1997)
Kybernetika
Similarity:
Volodymyr Lynnyk, Sergej Čelikovský (2010)
Kybernetika
Similarity:
In this paper, a modified version of the Chaos Shift Keying (CSK) scheme for secure encryption and decryption of data will be discussed. The classical CSK method determines the correct value of binary signal through checking which initially unsynchronized system is getting synchronized. On the contrary, the new anti-synchronization CSK (ACSK) scheme determines the wrong value of binary signal through checking which already synchronized system is loosing synchronization. The ACSK scheme...