Author:
Su Jianhuan,Zhang Yinjun,Chen Mengji
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Atomic and Molecular Physics, and Optics,Software
Reference29 articles.
1. Richardson, R.: CSI computer crime and security survey at 19.i.cmpnet.com (2008)
2. Li, Y., Dhotre, N.S., Ohara, Y., Kroeger, T.M., Miller, E.L., Long, D.D.E.: Horus: fine-grained encryption-based security for large-scale storage (PDF).
www.ssrc.ucsc.edu
. Discussion of encryption weaknesses for petabyte scale datasets
3. Corron, N.J., Hahs, D.W.: A new approach to communications using chaotic signals. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 44(5), 373–382 (1997)
4. Kocarev, L., Parlitz, U.: General approach for chaotic synchronization with applications to communication. Phys. Prev. Lett. 74(25), 5028–5031 (1995)
5. Yang, T., Wu, C.W., Chua, L.O.: Cryptography based on chaotic systems. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 44(5), 469–472 (1997)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献