Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
The chaotic encryption technology discussed in this study was the third generation, chaotic secret communication technology. It had a greater breakthrough in both theory and practice and had higher security and practicability, which basically met the needs of con- temporary people.
Nov 11, 2019 · Chaotic encryption technology has high sensitivity, orderliness and matching. It is an effective network communication security technology. It ...
People also ask
Zhongmin Cai: Security and confidentiality of network communication using chaotic encryption technology. J. Comput. Methods Sci. Eng. 19(4): 1083-1092 (2019).
Q. Huang, Analysis on the security enhancement model of communication system based on chaotic encryption and analytic hierarchy process, (10) (2016), 28–30.
A variety of flaws weaken the efficacy of a new chaos-based encryption algorithm for secure communication networks, which is a major concern [1]. Recent ...
Apr 27, 2024 · The efficacy of chaotic encryption lies in its ability to generate keys with high entropy, rendering brute-force attacks computationally ...
The use of robust information hiding with chaotic encryption presents a multi-level security to the data, besides providing check on data integrity. Multiple ...
Oct 23, 2024 · This paper presents a pioneering approach to bolstering network security and privacy by implementing chaotic optical communication with a hybrid optical ...
This research introduces an innovative image encryption technique that is based on a modified Skew Tent chaotic map.
Aug 29, 2022 · The purpose of this paper is to study the application of data encryption technology in computer network communication to provide better suggestions and explore ...