2019
DOI: 10.1007/978-3-030-12232-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication Systems Based on the Synchronization of Chaotic Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 105 publications
0
10
0
Order By: Relevance
“…Despite being chaotic, tracking the trajectory is possible using the principle of control theory [7]. This has occasioned applications in secure communication [8], random number synthesis [9], robotics [10], and so on. Although early on chaotic systems were used in the study of population [11], weather [12] and economic [13] models, they have in recent years, been applied to science and engineering products [14,15].…”
Section: Background On Chaos and Controlmentioning
confidence: 99%
“…Despite being chaotic, tracking the trajectory is possible using the principle of control theory [7]. This has occasioned applications in secure communication [8], random number synthesis [9], robotics [10], and so on. Although early on chaotic systems were used in the study of population [11], weather [12] and economic [13] models, they have in recent years, been applied to science and engineering products [14,15].…”
Section: Background On Chaos and Controlmentioning
confidence: 99%
“…Applications of digital telecommunications can be seen in all aspects of daily life and all industries including medicine and education, as well as social interactions [ 1 ]. Hence, there is a need to have secure communication.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, there is a need to have secure communication. To do this, many cryptography methods have been introduced, mainly encoding the data from the sender and decoding them at the receiver [ 1 ]. Cryptographical methods are based on various schemes, and a number of related papers have been published in this field [ 2 , 3 , 4 , 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…Regarding synchronization methods, applications of secure communications in the literature include chaotic masking (Aromataris and Annovazzi-Lodi, 2013), chaotic modulation (Bendoukha et al, 2019), and chaotic encryption (Li and Wu, 2018).…”
Section: Introductionmentioning
confidence: 99%