Chaotic Secure Communication : : Principles and Technologies / / Kehui Sun.

The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical refer...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2016]
©2016
Year of Publication:2016
Language:English
Online Access:
Physical Description:1 online resource (XIII, 333 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783110434064
lccn 2016041312
ctrlnum (DE-B1597)455245
(OCoLC)960040229
collection bib_alma
record_format marc
spelling Sun, Kehui, author. aut http://id.loc.gov/vocabulary/relators/aut
Chaotic Secure Communication : Principles and Technologies / Kehui Sun.
Berlin ; Boston : De Gruyter, [2016]
©2016
1 online resource (XIII, 333 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Characteristic Analysis Methods for Nonlinear System -- 3. Typical Chaotic Systems -- 4. Chaotic Synchronization Principle and Method -- 5. Secure Communication Technology Based on Chaos Synchronization -- 6. Data Encryption Based on Chaotic Sequence -- 7. Audio and Video Chaotic Encryption and Communication Technology -- 8. Analysis and Simulation of Fractional-Order Chaotic System -- 9. Simulation and Hardware Implementation of Chaotic System -- Appendix A: Important Academic Journals in the Field of Chaos -- Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- References -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
Chaotic synchronization.
Signal processing Mathematics.
Telecommunication Security measures.
COMPUTERS / Security / Networking. bisacsh
Tsinghua University Press,.
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016 9783110701005
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 9783110485103 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2016 9783110485110 ZDB-23-DEI
EPUB 9783110433265
print 9783110426885
https://doi.org/10.1515/9783110434064
https://www.degruyter.com/isbn/9783110434064
Cover https://www.degruyter.com/cover/covers/9783110434064.jpg
language English
format eBook
author Sun, Kehui,
Sun, Kehui,
spellingShingle Sun, Kehui,
Sun, Kehui,
Chaotic Secure Communication : Principles and Technologies /
Frontmatter --
Preface --
Contents --
1. Introduction --
2. Characteristic Analysis Methods for Nonlinear System --
3. Typical Chaotic Systems --
4. Chaotic Synchronization Principle and Method --
5. Secure Communication Technology Based on Chaos Synchronization --
6. Data Encryption Based on Chaotic Sequence --
7. Audio and Video Chaotic Encryption and Communication Technology --
8. Analysis and Simulation of Fractional-Order Chaotic System --
9. Simulation and Hardware Implementation of Chaotic System --
Appendix A: Important Academic Journals in the Field of Chaos --
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis --
References --
Index
author_facet Sun, Kehui,
Sun, Kehui,
Tsinghua University Press,.
author_variant k s ks
k s ks
author_role VerfasserIn
VerfasserIn
author2 Tsinghua University Press,.
author2_variant u p t up upt
author2_role TeilnehmendeR
author_sort Sun, Kehui,
title Chaotic Secure Communication : Principles and Technologies /
title_sub Principles and Technologies /
title_full Chaotic Secure Communication : Principles and Technologies / Kehui Sun.
title_fullStr Chaotic Secure Communication : Principles and Technologies / Kehui Sun.
title_full_unstemmed Chaotic Secure Communication : Principles and Technologies / Kehui Sun.
title_auth Chaotic Secure Communication : Principles and Technologies /
title_alt Frontmatter --
Preface --
Contents --
1. Introduction --
2. Characteristic Analysis Methods for Nonlinear System --
3. Typical Chaotic Systems --
4. Chaotic Synchronization Principle and Method --
5. Secure Communication Technology Based on Chaos Synchronization --
6. Data Encryption Based on Chaotic Sequence --
7. Audio and Video Chaotic Encryption and Communication Technology --
8. Analysis and Simulation of Fractional-Order Chaotic System --
9. Simulation and Hardware Implementation of Chaotic System --
Appendix A: Important Academic Journals in the Field of Chaos --
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis --
References --
Index
title_new Chaotic Secure Communication :
title_sort chaotic secure communication : principles and technologies /
publisher De Gruyter,
publishDate 2016
physical 1 online resource (XIII, 333 p.)
contents Frontmatter --
Preface --
Contents --
1. Introduction --
2. Characteristic Analysis Methods for Nonlinear System --
3. Typical Chaotic Systems --
4. Chaotic Synchronization Principle and Method --
5. Secure Communication Technology Based on Chaos Synchronization --
6. Data Encryption Based on Chaotic Sequence --
7. Audio and Video Chaotic Encryption and Communication Technology --
8. Analysis and Simulation of Fractional-Order Chaotic System --
9. Simulation and Hardware Implementation of Chaotic System --
Appendix A: Important Academic Journals in the Field of Chaos --
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis --
References --
Index
isbn 9783110434064
9783110701005
9783110485103
9783110485110
9783110433265
9783110426885
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5102
callnumber-sort TK 45102.85 S86 42016
url https://doi.org/10.1515/9783110434064
https://www.degruyter.com/isbn/9783110434064
https://www.degruyter.com/cover/covers/9783110434064.jpg
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 620 - Engineering
dewey-ones 621 - Applied physics
dewey-full 621.3820285582
dewey-sort 3621.3820285582
dewey-raw 621.3820285582
dewey-search 621.3820285582
doi_str_mv 10.1515/9783110434064
oclc_num 960040229
work_keys_str_mv AT sunkehui chaoticsecurecommunicationprinciplesandtechnologies
AT tsinghuauniversitypress chaoticsecurecommunicationprinciplesandtechnologies
status_str n
ids_txt_mv (DE-B1597)455245
(OCoLC)960040229
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2016
is_hierarchy_title Chaotic Secure Communication : Principles and Technologies /
container_title Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016
author2_original_writing_str_mv noLinkedField
_version_ 1770177618583224320
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03988nam a22008175i 4500</leader><controlfield tag="001">9783110434064</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20162016gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2016041312</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)962087067</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110434064</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110434064</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)455245</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960040229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">TK5102.85</subfield><subfield code="b">.S86 2016</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5102.85</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="8">1u</subfield><subfield code="a">621.3820285582</subfield><subfield code="q">DE-101</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sun, Kehui, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Chaotic Secure Communication :</subfield><subfield code="b">Principles and Technologies /</subfield><subfield code="c">Kehui Sun.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XIII, 333 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Characteristic Analysis Methods for Nonlinear System -- </subfield><subfield code="t">3. Typical Chaotic Systems -- </subfield><subfield code="t">4. Chaotic Synchronization Principle and Method -- </subfield><subfield code="t">5. Secure Communication Technology Based on Chaos Synchronization -- </subfield><subfield code="t">6. Data Encryption Based on Chaotic Sequence -- </subfield><subfield code="t">7. Audio and Video Chaotic Encryption and Communication Technology -- </subfield><subfield code="t">8. Analysis and Simulation of Fractional-Order Chaotic System -- </subfield><subfield code="t">9. Simulation and Hardware Implementation of Chaotic System -- </subfield><subfield code="t">Appendix A: Important Academic Journals in the Field of Chaos -- </subfield><subfield code="t">Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- </subfield><subfield code="t">References -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Chaotic synchronization.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Signal processing</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsinghua University Press,.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus eBook-Package 2016</subfield><subfield code="z">9783110701005</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2016</subfield><subfield code="z">9783110485103</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2016</subfield><subfield code="z">9783110485110</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110433265</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110426885</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110434064</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110434064</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9783110434064.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070100-5 DG Plus eBook-Package 2016</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2016</subfield></datafield></record></collection>