<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 30 Issue 8
Aug.  2021
Turn off MathJax
Article Contents
WENG Yifang, ZHENG Deling, JU Lei. A kind of chaotic synchronized secure communication methodology with time-varying parameters[J]. Chinese Journal of Engineering, 2008, 30(8): 952-958. doi: 10.13374/j.issn1001-053x.2008.08.024
Citation: WENG Yifang, ZHENG Deling, JU Lei. A kind of chaotic synchronized secure communication methodology with time-varying parameters[J]. Chinese Journal of Engineering, 2008, 30(8): 952-958. doi: 10.13374/j.issn1001-053x.2008.08.024

A kind of chaotic synchronized secure communication methodology with time-varying parameters

doi: 10.13374/j.issn1001-053x.2008.08.024
  • Received Date: 2007-08-08
  • Rev Recd Date: 2008-03-05
  • Available Online: 2021-08-06
  • A kind of chaotic synchronized secure communication scheme with time-varying parameters was proposed to solve the problem of parameter sensitivity reduction caused by chaotic synchronization, which further degrades the security. The stability of synchronization was then proved. It is unique that the chaotic activities obey the strange attractor globally, while in local they move randomly. As a result, the chaotic obits are more complex, the parameter sensitivity degree rises from 1 to 10. It makes the system hard to be broken by exhaustive attack and phase space restructuring. When the active-passive decomposition method is used, the secure communication scheme has no synchronized error. Simulation results indicate the effectiveness of the method. It is applicable to a kind of continuous chaotic system.

     

  • loading
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索
    Article views (172) PDF downloads(5) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频