Observer-based secure communication using indirect coupled synchronization
暂无分享,去创建一个
Zabih Ghassemlooy | Rupak Kharel | Krishna Busawon | Zabih Ghassemlooy | R. Kharel | Krishna Busawon
[1] Leon O. Chua,et al. Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.
[2] K. Wong,et al. A secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.
[3] Kevin M. Short,et al. Steps Toward Unmasking Secure Communications , 1994 .
[4] Henk Nijmeijer,et al. An observer looks at synchronization , 1997 .
[5] Chun-Mei Yang,et al. Cryptanalyzing chaotic secure communications using return maps , 1998 .
[6] Achour Ouslimani,et al. Feasibility of Analog Realization of a Sliding-Mode Observer: Application to Data Transmission , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.
[7] C Zhou,et al. Extracting messages masked by chaotic signals of time-delay systems. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[8] Kevin M. Short,et al. UNMASKING A HYPERCHAOTIC COMMUNICATION SCHEME , 1998 .
[9] G Alvarez,et al. Breaking a secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.
[10] Tao Yang,et al. A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .
[11] Murat Akgül,et al. Observer Based Chaotic Message Transmission , 2003, Int. J. Bifurc. Chaos.
[12] M. Boutayeb,et al. Generalized state-space observers for chaotic synchronization and secure communication , 2002 .
[13] Gonzalo Alvarez,et al. Breaking projective chaos synchronization secure communication using filtering and generalized synchronization , 2004, Chaos, Solitons & Fractals.
[14] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[15] Daolin Xu,et al. A secure communication scheme using projective chaos synchronization , 2004 .
[16] Alan V. Oppenheim,et al. Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.
[17] Tao Yang,et al. Application of neural networks to unmasking chaotic secure communication , 1998 .
[18] Kevin M. Short,et al. UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .
[19] Kevin M. Short,et al. Reconstructing the keystream from a chaotic encryption scheme , 2001 .
[20] Zabih Ghassemlooy,et al. Secure communication based on indirect coupled synchronization , 2012, ICONS 2012.