Skip to main content
Kent Academic Repository

Secure computer communication using chaotic algorithms

Sobhy, Mohammed, Shehata, Alaa-El-Din (2000) Secure computer communication using chaotic algorithms. International Journal of Bifurcation and Chaos, 10 (12). pp. 2831-2839. ISSN 0218-1274. (doi:10.1142/s021812740000181x) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16648)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
https://doi.org/10.1142/s021812740000181x

Abstract

In this paper the application of chaotic algorithms in sending computer messages is described. The communication is achieved through email. Other transmission media can also be used. The algorithm has a degree of security many orders of magnitude higher than systems based on physical electronic circuitry. Both text, image or recorded voice messages can be transmitted. The algorithm can be used for computer communication and for secure databases.

Item Type: Article
DOI/Identification number: 10.1142/s021812740000181x
Subjects: Q Science
Q Science > QA Mathematics (inc Computing science)
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts
Depositing User: A. Xie
Date Deposited: 22 Jun 2009 09:43 UTC
Last Modified: 05 Nov 2024 09:51 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/16648 (The current URI for this page, for reference purposes)

University of Kent Author Information

Sobhy, Mohammed.

Creator's ORCID:
CReDIT Contributor Roles:
  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.