Sign in

Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption.

Zhiming QuTongbin MaYunlong Zhang
Published in: ISECS (2008)
Keyphrases
  • key exchange
  • identity authentication
  • information security
  • security requirements
  • security analysis
  • mobile commerce
  • encryption scheme
  • network connection