Sobhy, Mohammed, Shehata, Alaa-El-Din (2000) Secure computer communication using chaotic algorithms. International Journal of Bifurcation and Chaos, 10 (12). pp. 2831-2839. ISSN 0218-1274. (doi:10.1142/s021812740000181x) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16648)
The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided. | |
Official URL: https://doi.org/10.1142/s021812740000181x |
Abstract
In this paper the application of chaotic algorithms in sending computer messages is described. The communication is achieved through email. Other transmission media can also be used. The algorithm has a degree of security many orders of magnitude higher than systems based on physical electronic circuitry. Both text, image or recorded voice messages can be transmitted. The algorithm can be used for computer communication and for secure databases.
Item Type: | Article |
---|---|
DOI/Identification number: | 10.1142/s021812740000181x |
Subjects: |
Q Science Q Science > QA Mathematics (inc Computing science) |
Divisions: | Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts |
Depositing User: | A. Xie |
Date Deposited: | 22 Jun 2009 09:43 UTC |
Last Modified: | 05 Nov 2024 09:51 UTC |
Resource URI: | https://kar.kent.ac.uk/id/eprint/16648 (The current URI for this page, for reference purposes) |
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):