Results 31 to 40 of about 94,144 (269)

A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps

open access: yesIEEE Access, 2018
With the rapid growth in the popularity of mobile devices and development of network technologies, various online social networking applications have grown in popularity.
Chun-Ta Li, Tsu-Yang Wu, Chien-Ming Chen
doaj   +1 more source

Synchronization and partial synchronization of linear maps

open access: yes, 2003
We study synchronization of low-dimensional ($d=2,3,4$) chaotic piecewise linear maps. For Bernoulli maps we find Lyapunov exponents and locate the synchronization transition, that numerically is found to be discontinuous (despite continuously vanishing ...
Adam Lipowski   +21 more
core   +1 more source

A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme

open access: yesIET Information Security, 2023
Anonymous data exchange is in great demand in many situations, especially in remote control systems, in which a stable, secure, and secret data channel must be established between the controlling and controlled parties to distribute control commands and ...
Kai Lin   +3 more
doaj   +1 more source

Nonlinearly driven transverse synchronization in coupled chaotic systems

open access: yes, 2005
Synchronization transitions are investigated in coupled chaotic maps. Depending on the relative weight of linear versus nonlinear instability mechanisms associated to the single map two different scenarios for the transition may occur. When only two maps
Ahlers   +41 more
core   +1 more source

An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment

open access: yesMathematics, 2021
With the increasing number of users and the emergence of different types of network services, a multi-server architecture has emerged in recent years. In order to ensure the secure communication of Internet participants in an open network environment, the authentication and key agreement protocol for multi-server architectures were proposed in the past.
Yu, Yicheng   +3 more
openaire   +2 more sources

Chaotic Behaviour in Some Discrete –Time Adaptive Control Systems [PDF]

open access: yes, 2013
It has been shown that nonlinear discrete maps can display extremely rich behaviour and under certain parameter conditions to show chaotic phenomenon.
Khan, Khalid
core  

Information transfer and nontrivial collective behavior in chaotic coupled map networks

open access: yes, 2002
The emergence of nontrivial collective behavior in networks of coupled chaotic maps is investigated by means of a nonlinear mutual prediction method. The resulting prediction error is used to measure the amount of information that a local unit possesses ...
Cisneros, L.   +3 more
core   +1 more source

A-coupled-expanding and distributional chaos [PDF]

open access: yes, 2014
The concept of A-coupled-expanding map, which is one of the more natural and useful ideas generalized the horseshoe map, is well known as a criterion of chaos. It is well known that distributional chaos is one of the concepts which reflect strong chaotic
Ju, Hyonhui, Kim, Cholsan, Raith, Peter
core   +1 more source

Stabilization of Miscible Aqueous Phases via Diffusion‐Controlled Multifunctional Nanoparticle‐Ligand Complexation

open access: yesAdvanced Functional Materials, EarlyView.
This study presents a versatile approach to harnessing miscible aqueous domains, enabling liquid‐in‐liquid compartmentalization using a barrier formed in situ rather than bulk immiscibility. The barrier forms upon the complexation of multifunctional nanoparticles and ligands at the contact boundary of aqueous phases.
Seyyed Alireza Hashemi   +7 more
wiley   +1 more source

High-Dimensional Delayed Cyclic-Coupled Chaotic Model with Time-Varying Parameter Control for Counteracting Finite-Precision Degradation

open access: yesMathematics
Digital chaotic systems suffer severe dynamical degradation under finite computational precision, compromising their randomness and unpredictability in security-critical applications.
Qingfeng Huang, Jianan Bao, Lingfeng Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy