A hybrid chaotic map for communication security applications.
Hamsa A. AbdullahHikmat N. AbdullahWaleed A. Mahmoud Al-JawherPublished in: Int. J. Commun. Syst. (2020)
Keyphrases
- chaotic map
- piecewise linear
- image encryption
- security analysis
- hash functions
- intrusion detection
- security requirements
- network security
- s box
- information security
- security issues
- security mechanisms
- access control
- information sharing
- communication networks
- computer networks
- feature space
- key management
- global optimization
- pseudorandom
- user authentication
- authentication scheme
- evolutionary algorithm
- high dimensional