000 | 03058cam0a2200409 4500 | ||
---|---|---|---|
001 | 13793 | ||
009 | 177411252 | ||
003 | http://www.sudoc.fr/177411252 | ||
005 | 20250630092349.0 | ||
010 |
_a9781466554504 _brel. _d72.74 EUR. |
||
020 |
_aUS _b2013013445 |
||
090 | _a13793 | ||
099 |
_tOUVR _zALEX26929 |
||
100 | _a20140407d2013 u y0muly50 ba | ||
101 | 0 |
_aeng _2639-2 |
|
102 | _aUS | ||
105 | _aa a 001yy | ||
181 |
_6z01 _ctxt _2rdacontent |
||
181 | 1 |
_6z01 _ai# _bxxxe## |
|
182 |
_6z01 _cn _2rdamedia |
||
182 | 1 |
_6z01 _an |
|
200 | 1 |
_aDiscrete dynamical systems and chaotic machines _etheory and applications _fJacques M. Bahi, Christophe Guyeux |
|
210 |
_aBoca Raton (FL) _cCRC Press _dcop. 2013 |
||
215 |
_a1 vol (xvi, 212 p.) _cill. _d25 cm |
||
225 | 0 | _aChapman & Hall/CRC numerical analysis and scientific computing | |
320 | _aIncludes bibliographical references (pages 197-209) and index. | ||
330 | _a"For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science. Covering both theoretical and practical aspects, the book presents: Key mathematical and physical ideas in chaos theory Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance. Until the authors' recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes"-- | ||
606 |
_3027248062 _aSystèmes informatiques _xMesures de sûreté _2rameau |
||
606 |
_3028038711 _aChaos (théorie des systèmes) _2rameau |
||
606 |
_3027363953 _aDynamique _2rameau |
||
606 |
_aComputer security _2lc |
||
606 |
_aChaotic behavior in systems _2lc |
||
606 |
_aDynamics _2lc |
||
676 |
_a005.8 _v23 |
||
680 |
_aQA76.9.A25 _bB344 2013 |
||
700 | 1 |
_3058570578 _aBahi _bJacques _4070 _4070 |
|
702 | 1 |
_315618009X _aGuyeux _bChristophe _f19..-.... _4070 |