Login / Signup
Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security.
Warakorn Srichavengsup
Wimol San-Um
Published in:
Int. J. Netw. Secur. (2016)
Keyphrases
</>
cellular automata
information security
data analysis
data sources
encryption scheme
information systems
data structure
data mining techniques
intrusion detection
database
databases
data management
access control
high dimensional data