Chaotic secure communication: principles and technologies
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical refer...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston
De Gruyter
[2016]
|
Schlagworte: | |
Online-Zugang: | FAB01 FAW01 FCO01 FHA01 FHR01 FKE01 FLA01 TUM01 UBY01 UPA01 URL des Erstveröffentlichers |
Zusammenfassung: | The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers |
Beschreibung: | Description based on online resource; title from PDF title page (publisher's Web site, viewed Sep. 08, 2016) |
Beschreibung: | 1 Online-Ressource (346 Seiten) |
ISBN: | 9783110434064 |
DOI: | 10.1515/9783110434064 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043867730 | ||
003 | DE-604 | ||
005 | 20221027 | ||
007 | cr|uuu---uuuuu | ||
008 | 161109s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783110434064 |9 978-3-11-043406-4 | ||
024 | 7 | |a 10.1515/9783110434064 |2 doi | |
035 | |a (ZDB-23-DGG)9783110434064 | ||
035 | |a (OCoLC)960040229 | ||
035 | |a (DE-599)BVBBV043867730 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-859 |a DE-860 |a DE-91 |a DE-706 |a DE-Aug4 |a DE-898 |a DE-739 |a DE-1046 |a DE-1043 |a DE-858 |a DE-526 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Sun, Kehui |e Verfasser |0 (DE-588)1115666932 |4 aut | |
245 | 1 | 0 | |a Chaotic secure communication |b principles and technologies |c Kehui Sun |
264 | 1 | |a Berlin ; Boston |b De Gruyter |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (346 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed Sep. 08, 2016) | ||
520 | |a The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers | ||
546 | |a In English | ||
650 | 0 | 7 | |a Synchronisierung |0 (DE-588)4130847-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Regelungssystem |0 (DE-588)4134712-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Telekommunikation |0 (DE-588)4059360-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chaotisches System |0 (DE-588)4316104-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chaotisches System |0 (DE-588)4316104-2 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Regelungssystem |0 (DE-588)4134712-2 |D s |
689 | 0 | 4 | |a Synchronisierung |0 (DE-588)4130847-5 |D s |
689 | 0 | 5 | |a Telekommunikation |0 (DE-588)4059360-5 |D s |
689 | 0 | 6 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-11-042688-5 |
856 | 4 | 0 | |u https://doi.org/10.1515/9783110434064 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG |a ZDB-23-DEI | ||
940 | 1 | |q ZDB-23-DEI16 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029277669 | ||
966 | e | |u https://doi.org/10.1515/9783110434064 |l FAB01 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l FHR01 |p ZDB-23-DEI |q ZDB-23-DEI16 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l TUM01 |p ZDB-23-DEI |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l UBY01 |p ZDB-23-DEI |q UBY_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110434064 |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176753415946240 |
---|---|
any_adam_object | |
author | Sun, Kehui |
author_GND | (DE-588)1115666932 |
author_facet | Sun, Kehui |
author_role | aut |
author_sort | Sun, Kehui |
author_variant | k s ks |
building | Verbundindex |
bvnumber | BV043867730 |
classification_rvk | ST 276 |
collection | ZDB-23-DGG ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9783110434064 (OCoLC)960040229 (DE-599)BVBBV043867730 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1515/9783110434064 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03697nmm a2200697zc 4500</leader><controlfield tag="001">BV043867730</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221027 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161109s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110434064</subfield><subfield code="9">978-3-11-043406-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110434064</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9783110434064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960040229</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043867730</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-526</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sun, Kehui</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1115666932</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Chaotic secure communication</subfield><subfield code="b">principles and technologies</subfield><subfield code="c">Kehui Sun</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (346 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed Sep. 08, 2016)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Synchronisierung</subfield><subfield code="0">(DE-588)4130847-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Regelungssystem</subfield><subfield code="0">(DE-588)4134712-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikation</subfield><subfield code="0">(DE-588)4059360-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chaotisches System</subfield><subfield code="0">(DE-588)4316104-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chaotisches System</subfield><subfield code="0">(DE-588)4316104-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Regelungssystem</subfield><subfield code="0">(DE-588)4134712-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Synchronisierung</subfield><subfield code="0">(DE-588)4130847-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Telekommunikation</subfield><subfield code="0">(DE-588)4059360-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-11-042688-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-23-DEI16</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029277669</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">ZDB-23-DEI16</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">UBY_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110434064</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043867730 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:37:11Z |
institution | BVB |
isbn | 9783110434064 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029277669 |
oclc_num | 960040229 |
open_access_boolean | |
owner | DE-859 DE-860 DE-91 DE-BY-TUM DE-706 DE-Aug4 DE-898 DE-BY-UBR DE-739 DE-1046 DE-1043 DE-858 DE-526 DE-83 |
owner_facet | DE-859 DE-860 DE-91 DE-BY-TUM DE-706 DE-Aug4 DE-898 DE-BY-UBR DE-739 DE-1046 DE-1043 DE-858 DE-526 DE-83 |
physical | 1 Online-Ressource (346 Seiten) |
psigel | ZDB-23-DGG ZDB-23-DEI ZDB-23-DEI16 ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DEI ZDB-23-DEI16 ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DEI TUM_Paketkauf ZDB-23-DEI UBY_Paketkauf ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | De Gruyter |
record_format | marc |
spelling | Sun, Kehui Verfasser (DE-588)1115666932 aut Chaotic secure communication principles and technologies Kehui Sun Berlin ; Boston De Gruyter [2016] © 2016 1 Online-Ressource (346 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from PDF title page (publisher's Web site, viewed Sep. 08, 2016) The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers In English Synchronisierung (DE-588)4130847-5 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Regelungssystem (DE-588)4134712-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Telekommunikation (DE-588)4059360-5 gnd rswk-swf Chaotisches System (DE-588)4316104-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Chaotisches System (DE-588)4316104-2 s Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s Regelungssystem (DE-588)4134712-2 s Synchronisierung (DE-588)4130847-5 s Telekommunikation (DE-588)4059360-5 s Datensicherung (DE-588)4011144-1 s DE-604 Erscheint auch als Druck-Ausgabe 978-3-11-042688-5 https://doi.org/10.1515/9783110434064 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Sun, Kehui Chaotic secure communication principles and technologies Synchronisierung (DE-588)4130847-5 gnd Chiffrierung (DE-588)4352893-4 gnd Regelungssystem (DE-588)4134712-2 gnd Datensicherung (DE-588)4011144-1 gnd Telekommunikation (DE-588)4059360-5 gnd Chaotisches System (DE-588)4316104-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4130847-5 (DE-588)4352893-4 (DE-588)4134712-2 (DE-588)4011144-1 (DE-588)4059360-5 (DE-588)4316104-2 (DE-588)4033329-2 |
title | Chaotic secure communication principles and technologies |
title_auth | Chaotic secure communication principles and technologies |
title_exact_search | Chaotic secure communication principles and technologies |
title_full | Chaotic secure communication principles and technologies Kehui Sun |
title_fullStr | Chaotic secure communication principles and technologies Kehui Sun |
title_full_unstemmed | Chaotic secure communication principles and technologies Kehui Sun |
title_short | Chaotic secure communication |
title_sort | chaotic secure communication principles and technologies |
title_sub | principles and technologies |
topic | Synchronisierung (DE-588)4130847-5 gnd Chiffrierung (DE-588)4352893-4 gnd Regelungssystem (DE-588)4134712-2 gnd Datensicherung (DE-588)4011144-1 gnd Telekommunikation (DE-588)4059360-5 gnd Chaotisches System (DE-588)4316104-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Synchronisierung Chiffrierung Regelungssystem Datensicherung Telekommunikation Chaotisches System Kryptologie |
url | https://doi.org/10.1515/9783110434064 |
work_keys_str_mv | AT sunkehui chaoticsecurecommunicationprinciplesandtechnologies |