Login / Signup

Methods of attacking chaotic encryption and countermeasures.

Mohamed I. SobhyAlaa-eldin R. Shehata
Published in: ICASSP (2001)
Keyphrases
  • countermeasures
  • information security
  • machine learning
  • operating system