A Chaos Based Secure Communication Scheme for Hybrid Message Logging and Asynchronous Checkpointing for Mobile Computing
暂无分享,去创建一个
[1] Carroll,et al. Synchronization in chaotic systems. , 1990, Physical review letters.
[2] Jong Kim,et al. Secure checkpointing , 2003, J. Syst. Archit..
[3] M. Hasler,et al. Communication by chaotic signals : the inverse system approach , 1996 .
[4] A. P. Misra,et al. Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption , 2011, 1102.2775.
[5] Hong Zhou,et al. Problems with the chaotic inverse system encryption approach , 1997 .
[6] Guanrong Chen,et al. Generating Hyperchaos via State Feedback Control , 2005, Int. J. Bifurc. Chaos.
[7] Robert E. Strom,et al. Optimistic recovery in distributed systems , 1985, TOCS.
[8] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[9] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[10] Jin-Hee Cho,et al. Performance optimization of region-based group key management in mobile ad hoc networks , 2008, Perform. Evaluation.
[11] Leslie Lamport,et al. Distributed snapshots: determining global states of distributed systems , 1985, TOCS.
[12] Santo Banerjee,et al. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption , 2010 .
[13] Santo Banerjee,et al. Synchronization between two different time-delayed systems and image encryption , 2007 .
[14] N. Asokan,et al. Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] Heon Young Yeom,et al. An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems , 2002, IEEE Trans. Mob. Comput..
[17] Willy Zwaenepoel,et al. The performance of consistent checkpointing , 1992, [1992] Proceedings 11th Symposium on Reliable Distributed Systems.
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Bharat K. Bhargava,et al. Vulnerabilities and Threats in Distributed Systems , 2004, ICDCIT.
[20] Bharat K. Bhargava,et al. Fraud Formalization and Detection , 2003, DaWaK.
[21] Gonzalo Alvarez,et al. Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[22] B. R. Badrinath,et al. Checkpointing distributed applications on mobile computers , 1994, Proceedings of 3rd International Conference on Parallel and Distributed Information Systems.
[23] Mukesh Singhal,et al. On the impossibility of min-process non-blocking checkpointing and an efficient checkpointing algorithm for mobile computing systems , 1998, Proceedings. 1998 International Conference on Parallel Processing (Cat. No.98EX205).
[24] P. Holmes,et al. Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields , 1983, Applied Mathematical Sciences.
[25] Leon O. Chua,et al. Spread spectrum Communication through modulation of Chaos in Chua's Circuit , 1993, Chua's Circuit.
[26] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[27] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[28] Leon O. Chua,et al. Spread Spectrum Communication Through Modulation of Chaos , 1993 .
[29] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[30] Mario Gerla,et al. Vehicular networks and the future of the mobile internet , 2011, Comput. Networks.
[31] Lorenzo Alvisi,et al. Nonblocking and orphan-free message logging protocols , 1992, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[32] Michael Peter Kennedy,et al. Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .
[33] Salman A. Khan,et al. Design and analysis of a fault tolerant hybrid mobile scheme , 2007, Inf. Sci..
[34] Wolfgang Kinzel,et al. Public-channel cryptography using chaos synchronization. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[35] Santo Banerjee,et al. Cooperating Swarms: A Paradigm for Collective Intelligence and its Application in Finance , 2010 .
[36] Santo Banerjee,et al. Chaos Synchronization with Genetic Engineering Algorithm for Secure Communications , 2011 .
[37] Indrajit Ray,et al. A Secure Checkpointing Protocol for Survivable Server Design , 2004, ICDCIT.
[38] Paz Morillo,et al. Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.
[39] Bharat K. Bhargava,et al. Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach , 1988, Proceedings [1988] Seventh Symposium on Reliable Distributed Systems.
[40] A. Roy Chowdhury,et al. Chaotic aspects of lasers with host-induced nonlinearity and its control , 2001 .