Chaotic Secure Communication : : Principles and Technologies / / Kehui Sun.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical refer...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016 |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2016] ©2016 |
Year of Publication: | 2016 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (XIII, 333 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9783110434064 |
---|---|
lccn |
2016041312 |
ctrlnum |
(DE-B1597)455245 (OCoLC)960040229 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sun, Kehui, author. aut http://id.loc.gov/vocabulary/relators/aut Chaotic Secure Communication : Principles and Technologies / Kehui Sun. Berlin ; Boston : De Gruyter, [2016] ©2016 1 online resource (XIII, 333 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Characteristic Analysis Methods for Nonlinear System -- 3. Typical Chaotic Systems -- 4. Chaotic Synchronization Principle and Method -- 5. Secure Communication Technology Based on Chaos Synchronization -- 6. Data Encryption Based on Chaotic Sequence -- 7. Audio and Video Chaotic Encryption and Communication Technology -- 8. Analysis and Simulation of Fractional-Order Chaotic System -- 9. Simulation and Hardware Implementation of Chaotic System -- Appendix A: Important Academic Journals in the Field of Chaos -- Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- References -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) Chaotic synchronization. Signal processing Mathematics. Telecommunication Security measures. COMPUTERS / Security / Networking. bisacsh Tsinghua University Press,. Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016 9783110701005 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 9783110485103 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2016 9783110485110 ZDB-23-DEI EPUB 9783110433265 print 9783110426885 https://doi.org/10.1515/9783110434064 https://www.degruyter.com/isbn/9783110434064 Cover https://www.degruyter.com/cover/covers/9783110434064.jpg |
language |
English |
format |
eBook |
author |
Sun, Kehui, Sun, Kehui, |
spellingShingle |
Sun, Kehui, Sun, Kehui, Chaotic Secure Communication : Principles and Technologies / Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Characteristic Analysis Methods for Nonlinear System -- 3. Typical Chaotic Systems -- 4. Chaotic Synchronization Principle and Method -- 5. Secure Communication Technology Based on Chaos Synchronization -- 6. Data Encryption Based on Chaotic Sequence -- 7. Audio and Video Chaotic Encryption and Communication Technology -- 8. Analysis and Simulation of Fractional-Order Chaotic System -- 9. Simulation and Hardware Implementation of Chaotic System -- Appendix A: Important Academic Journals in the Field of Chaos -- Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- References -- Index |
author_facet |
Sun, Kehui, Sun, Kehui, Tsinghua University Press,. |
author_variant |
k s ks k s ks |
author_role |
VerfasserIn VerfasserIn |
author2 |
Tsinghua University Press,. |
author2_variant |
u p t up upt |
author2_role |
TeilnehmendeR |
author_sort |
Sun, Kehui, |
title |
Chaotic Secure Communication : Principles and Technologies / |
title_sub |
Principles and Technologies / |
title_full |
Chaotic Secure Communication : Principles and Technologies / Kehui Sun. |
title_fullStr |
Chaotic Secure Communication : Principles and Technologies / Kehui Sun. |
title_full_unstemmed |
Chaotic Secure Communication : Principles and Technologies / Kehui Sun. |
title_auth |
Chaotic Secure Communication : Principles and Technologies / |
title_alt |
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Characteristic Analysis Methods for Nonlinear System -- 3. Typical Chaotic Systems -- 4. Chaotic Synchronization Principle and Method -- 5. Secure Communication Technology Based on Chaos Synchronization -- 6. Data Encryption Based on Chaotic Sequence -- 7. Audio and Video Chaotic Encryption and Communication Technology -- 8. Analysis and Simulation of Fractional-Order Chaotic System -- 9. Simulation and Hardware Implementation of Chaotic System -- Appendix A: Important Academic Journals in the Field of Chaos -- Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- References -- Index |
title_new |
Chaotic Secure Communication : |
title_sort |
chaotic secure communication : principles and technologies / |
publisher |
De Gruyter, |
publishDate |
2016 |
physical |
1 online resource (XIII, 333 p.) |
contents |
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Characteristic Analysis Methods for Nonlinear System -- 3. Typical Chaotic Systems -- 4. Chaotic Synchronization Principle and Method -- 5. Secure Communication Technology Based on Chaos Synchronization -- 6. Data Encryption Based on Chaotic Sequence -- 7. Audio and Video Chaotic Encryption and Communication Technology -- 8. Analysis and Simulation of Fractional-Order Chaotic System -- 9. Simulation and Hardware Implementation of Chaotic System -- Appendix A: Important Academic Journals in the Field of Chaos -- Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- References -- Index |
isbn |
9783110434064 9783110701005 9783110485103 9783110485110 9783110433265 9783110426885 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5102 |
callnumber-sort |
TK 45102.85 S86 42016 |
url |
https://doi.org/10.1515/9783110434064 https://www.degruyter.com/isbn/9783110434064 https://www.degruyter.com/cover/covers/9783110434064.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
600 - Technology |
dewey-tens |
620 - Engineering |
dewey-ones |
621 - Applied physics |
dewey-full |
621.3820285582 |
dewey-sort |
3621.3820285582 |
dewey-raw |
621.3820285582 |
dewey-search |
621.3820285582 |
doi_str_mv |
10.1515/9783110434064 |
oclc_num |
960040229 |
work_keys_str_mv |
AT sunkehui chaoticsecurecommunicationprinciplesandtechnologies AT tsinghuauniversitypress chaoticsecurecommunicationprinciplesandtechnologies |
status_str |
n |
ids_txt_mv |
(DE-B1597)455245 (OCoLC)960040229 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2016 |
is_hierarchy_title |
Chaotic Secure Communication : Principles and Technologies / |
container_title |
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2016 |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1770177618583224320 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03988nam a22008175i 4500</leader><controlfield tag="001">9783110434064</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20162016gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2016041312</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)962087067</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110434064</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110434064</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)455245</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960040229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">TK5102.85</subfield><subfield code="b">.S86 2016</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5102.85</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="8">1u</subfield><subfield code="a">621.3820285582</subfield><subfield code="q">DE-101</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sun, Kehui, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Chaotic Secure Communication :</subfield><subfield code="b">Principles and Technologies /</subfield><subfield code="c">Kehui Sun.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XIII, 333 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Characteristic Analysis Methods for Nonlinear System -- </subfield><subfield code="t">3. Typical Chaotic Systems -- </subfield><subfield code="t">4. Chaotic Synchronization Principle and Method -- </subfield><subfield code="t">5. Secure Communication Technology Based on Chaos Synchronization -- </subfield><subfield code="t">6. Data Encryption Based on Chaotic Sequence -- </subfield><subfield code="t">7. Audio and Video Chaotic Encryption and Communication Technology -- </subfield><subfield code="t">8. Analysis and Simulation of Fractional-Order Chaotic System -- </subfield><subfield code="t">9. Simulation and Hardware Implementation of Chaotic System -- </subfield><subfield code="t">Appendix A: Important Academic Journals in the Field of Chaos -- </subfield><subfield code="t">Appendix B: Matlab Source Programs of Chaos Characteristic Analysis -- </subfield><subfield code="t">References -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Chaotic synchronization.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Signal processing</subfield><subfield code="x">Mathematics.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsinghua University Press,.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus eBook-Package 2016</subfield><subfield code="z">9783110701005</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2016</subfield><subfield code="z">9783110485103</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2016</subfield><subfield code="z">9783110485110</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110433265</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110426885</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110434064</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110434064</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9783110434064.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070100-5 DG Plus eBook-Package 2016</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2016</subfield></datafield></record></collection> |