Discrete dynamical systems and chaotic machines : theory and applications / Jacques M. Bahi, Christophe Guyeux.
By: Bahi, Jacques Mohcine [author.].
Contributor(s): Guyeux, Christophe [author.].
Series: Chapman & Hall/CRC numerical analysis and scientific computing.Publisher: Boca Raton : CRC Press, [2013]Description: xvi, 212 pages : illustrations ; 25 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781466554504 (hardback).Subject(s): Computer security | Chaotic behavior in systems | Dynamics | COMPUTERS / Security / Cryptography | MATHEMATICS / Advanced | MATHEMATICS / Differential EquationsGenre/Form: Print books.DDC classification: 005.8 Summary: "For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science. Covering both theoretical and practical aspects, the book presents: Key mathematical and physical ideas in chaos theory Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance. Until the authors' recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes"-- Provided by publisher.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9.A25 B344 2013 (Browse shelf) | Available | AU0000000004578 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
QA76.9.A25 A54 2020 Security engineering : a guide to building dependable distributed systems / | QA76.9.A25 A8246 2019 Security software development : assessing and managing security risks / | QA76.9.A25 A94 2019 The secret to cybersecurity : a simple plan to protect your family and business from cybercrime / | QA76.9.A25 B344 2013 Discrete dynamical systems and chaotic machines : theory and applications / | QA76.9.A25 B35 2020 Confident cyber security : how to get started in cyber security and futureproof your career / | QA76.9 .A25 B3793 2021 The Cybersecurity Manager's Guide | QA76.9.A25 B42 2018 Hacking for dummies / |
Includes bibliographical references (pages 197-209) and index.
"For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science. Covering both theoretical and practical aspects, the book presents: Key mathematical and physical ideas in chaos theory Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance. Until the authors' recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes"-- Provided by publisher.