Randomness and disorder of chaotic iterations. Applications in information security field.
Xiaole FangChristophe GuyeuxQianxue WangJacques M. BahiPublished in: CoRR (2016)
Keyphrases
- information security
- countermeasures
- intrusion detection
- security issues
- computer security
- smart card
- network security
- information systems
- information security management
- security requirements
- technical issues
- risk assessment
- information assurance
- information retrieval
- smart grid
- risk analysis
- security level
- database
- cyber defense
- user authentication
- iso iec
- privacy concerns
- object recognition