Security and confidentiality of network communication using chaotic encryption technology.
Zhongmin CaiPublished in: J. Comput. Methods Sci. Eng. (2019)
Keyphrases
- network communication
- security properties
- information exchange
- data encryption
- data confidentiality
- information security
- communication protocol
- access control
- encryption scheme
- security requirements
- digital rights management
- case study
- encryption algorithms
- encryption decryption
- data security
- secret key
- cryptographic protocols
- flow control
- data quality
- information leakage
- knowledge sharing