Displaying 121 – 140 of 192

Showing per page

On the anti–synchronization detection for the generalized Lorenz system and its applications to secure encryption

Volodymyr Lynnyk, Sergej Čelikovský (2010)

Kybernetika

In this paper, a modified version of the Chaos Shift Keying (CSK) scheme for secure encryption and decryption of data will be discussed. The classical CSK method determines the correct value of binary signal through checking which initially unsynchronized system is getting synchronized. On the contrary, the new anti-synchronization CSK (ACSK) scheme determines the wrong value of binary signal through checking which already synchronized system is loosing synchronization. The ACSK scheme is implemented...

On the computation of covert channel capacity

Eugene Asarin, Cătălin Dima (2010)

RAIRO - Theoretical Informatics and Applications

We address the problem of computing the capacity of a covert channel, modeled as a nondeterministic transducer. We give three possible statements of the notion of “covert channel capacity” and relate the different definitions. We then provide several methods allowing the computation of lower and upper bounds for the capacity of a channel. We show that, in some cases, including the case of input-deterministic channels, the capacity of the channel can be computed exactly (e.g. in the form...

On the g -entropy and its Hudetz correction

Beloslav Riečan (2002)

Kybernetika

The Hudetz correction of the fuzzy entropy is applied to the g -entropy. The new invariant is expressed by the Hudetz correction of fuzzy entropy.

Currently displaying 121 – 140 of 192