Enhanced cryptography by multiple chaotic dynamics.
Chen, Jianyong, Zhou, Junwei, Wong, Kwok-Wo, Ji, Zhen (2011)
Mathematical Problems in Engineering
Similarity:
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
Chen, Jianyong, Zhou, Junwei, Wong, Kwok-Wo, Ji, Zhen (2011)
Mathematical Problems in Engineering
Similarity:
Majumdar, Kaushik, Myers, Mark H. (2006)
Computational & Mathematical Methods in Medicine
Similarity:
Qian Fang, Ying Liu, Xiaoqun Zhao (2008)
Kybernetika
Similarity:
Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate...
Liu, Zonghua (2010)
Mathematical Problems in Engineering
Similarity:
He, Jun, Qian, Haifeng, Zhou, Yuan, Li, Zhibin (2010)
Mathematical Problems in Engineering
Similarity:
Yaoyao He, Jianzhong Zhou, Ning Lu, Hui Qin, Youlin Lu (2010)
Kybernetika
Similarity:
Differential evolution algorithm combined with chaotic pattern search(DE-CPS) for global optimization is introduced to improve the performance of simple DE algorithm. Pattern search algorithm using chaotic variables instead of random variables is used to accelerate the convergence of solving the objective value. Experiments on 6 benchmark problems, including morbid Rosenbrock function, show that the novel hybrid algorithm is effective for nonlinear optimization problems in high dimensional...