Secure point-to-point communication using chaos

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Point-to-Point versus Mobile Wireless Communication Channels 1.1 BANDPASS MODEL FOR POINT-TO-POINT COMMUNICATIONS

Most point-to-point communication links (e.g., the telephone line channel, fixed microwave channels, etc.) are well-modeled using a bandpass additive noise system model of the form shown in Figure 1.1. All the signals in this model are written with “tildas” which will be dropped in the complex baseband representation of the following section. A more detailed description of the link model is as ...

متن کامل

Round-Efficient Secure Computation in Point-to-Point Networks

Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poor round complexity when compiled for a point-to-point network due to the high overhead of emulating each invocation of broadcast. This problem is compounded when broadcast is used in more than one round of the origina...

متن کامل

Food chain chaos due to transcritical point.

Chaotic dynamics of a classical prey-predator-superpredator ecological model are considered. Although much is known about the behavior of the model numerically, very few results have been proven analytically. A new analytical result is obtained. It is demonstrated that there exists a subset on which a singular Poincare map generated by the model is conjugate to the shift map on two symbols. The...

متن کامل

Secure and Efficient Communication Method in Rogue Access Point Environments

WiFi networks, which have been widely used along with the explosive increases in the supply of smartphones, can provide high network speeds but cannot prevent user information spills though rogue Access Points (APs). Therefore, the present paper proposes a method to exchange SSL session keys through more secure 3G networks to be used in WiFi networks in order to prevent such spills. In the prop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DYNA

سال: 2016

ISSN: 2346-2183,0012-7353

DOI: 10.15446/dyna.v83n197.53506