Skip to main content
Kent Academic Repository

Secure e-mail and databases using chaotic encryption

Sobhy, Mohammed, Shehata, Alaa-El-Din (2000) Secure e-mail and databases using chaotic encryption. Electronics Letters, 36 (10). pp. 875-876. ISSN 0013-5194. (doi:10.1049/el:20000686) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16646)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1049/el:20000686

Abstract

An application of chaotic algorithms in sending computer messages is described. The communication is achieved through an e-mail channel. Other transmission media can also be used. The algorithm has a degree of security many orders of magnitude higher than systems based on physical electronic circuitry. Text, image or recorded voice messages can be transmitted.

Item Type: Article
DOI/Identification number: 10.1049/el:20000686
Subjects: T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts
Depositing User: A. Xie
Date Deposited: 22 Jun 2009 09:57 UTC
Last Modified: 05 Nov 2024 09:51 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/16646 (The current URI for this page, for reference purposes)

University of Kent Author Information

Sobhy, Mohammed.

Creator's ORCID:
CReDIT Contributor Roles:
  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.