000 03058cam0a2200409 4500
001 13793
009 177411252
003 http://www.sudoc.fr/177411252
005 20250630092349.0
010 _a9781466554504
_brel.
_d72.74 EUR.
020 _aUS
_b2013013445
090 _a13793
099 _tOUVR
_zALEX26929
100 _a20140407d2013 u y0muly50 ba
101 0 _aeng
_2639-2
102 _aUS
105 _aa a 001yy
181 _6z01
_ctxt
_2rdacontent
181 1 _6z01
_ai#
_bxxxe##
182 _6z01
_cn
_2rdamedia
182 1 _6z01
_an
200 1 _aDiscrete dynamical systems and chaotic machines
_etheory and applications
_fJacques M. Bahi, Christophe Guyeux
210 _aBoca Raton (FL)
_cCRC Press
_dcop. 2013
215 _a1 vol (xvi, 212 p.)
_cill.
_d25 cm
225 0 _aChapman & Hall/CRC numerical analysis and scientific computing
320 _aIncludes bibliographical references (pages 197-209) and index.
330 _a"For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science. Covering both theoretical and practical aspects, the book presents: Key mathematical and physical ideas in chaos theory Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance. Until the authors' recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes"--
606 _3027248062
_aSystèmes informatiques
_xMesures de sûreté
_2rameau
606 _3028038711
_aChaos (théorie des systèmes)
_2rameau
606 _3027363953
_aDynamique
_2rameau
606 _aComputer security
_2lc
606 _aChaotic behavior in systems
_2lc
606 _aDynamics
_2lc
676 _a005.8
_v23
680 _aQA76.9.A25
_bB344 2013
700 1 _3058570578
_aBahi
_bJacques
_4070
_4070
702 1 _315618009X
_aGuyeux
_bChristophe
_f19..-....
_4070