Login / Signup

Encryption Algorithm for TCP Session Hijacking.

Minghan ChenFangyan DaiBingjie YanJieren Cheng
Published in: ICAIS (2) (2020)
Keyphrases
  • encryption algorithm
  • encryption algorithms
  • security analysis
  • data encryption
  • pseudorandom
  • end to end
  • high security
  • digital content
  • chaotic maps
  • distributed systems
  • security requirements