Suitability of chaotic iterations schemes using XORshift for security applications.
Jacques M. BahiXiaole FangChristophe GuyeuxQianxue WangPublished in: J. Netw. Comput. Appl. (2014)
Keyphrases
- access control
- information security
- key agreement
- security issues
- security requirements
- key management scheme
- security policies
- intrusion detection
- key management
- security mechanisms
- network security
- iterative process
- functional requirements
- statistical databases
- provably secure
- information assurance
- security properties
- security management
- cellular automata
- wireless sensor networks
- security protocols
- cyber security
- security problems
- security threats
- key agreement protocol
- protection schemes