Discrete Dynamical Systems and Chaotic Machines
Theory and Applications
Seiten
2013
Crc Press Inc (Verlag)
978-1-4665-5450-4 (ISBN)
Crc Press Inc (Verlag)
978-1-4665-5450-4 (ISBN)
For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science.
Covering both theoretical and practical aspects, the book presents:
Key mathematical and physical ideas in chaos theory
Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines
Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography
Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance
Until the authors’ recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes.
Covering both theoretical and practical aspects, the book presents:
Key mathematical and physical ideas in chaos theory
Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines
Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography
Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance
Until the authors’ recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes.
Bahi, Jacques; Guyeux, Christophe
An Introduction to Chaos: Classical Examples by Way of Introduction. The Mathematical Theory of Chaos: Definitions and Notations. Devaney’s Formulation of Chaos. Other Formulations of Chaos. From Theory to Practice: A Fundamental Tool: the Chaotic Iterations. Theoretical Proofs of Chaotic Machines. Applications of Chaos in the Computer Science Field: Information Security. Wireless Sensor Networks. Conclusion: Conclusion. Bibliography. Index.
Reihe/Serie | Chapman & Hall/CRC Numerical Analysis and Scientific Computing Series |
---|---|
Verlagsort | Bosa Roca |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 476 g |
Themenwelt | Informatik ► Theorie / Studium ► Algorithmen |
Mathematik / Informatik ► Mathematik ► Analysis | |
Mathematik / Informatik ► Mathematik ► Logik / Mengenlehre | |
ISBN-10 | 1-4665-5450-9 / 1466554509 |
ISBN-13 | 978-1-4665-5450-4 / 9781466554504 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media
Buch | Softcover (2021)
Springer (Verlag)
CHF 41,95
Eine Einführung mit Java
Buch | Hardcover (2020)
dpunkt (Verlag)
CHF 62,85
Praktische Übungen für die Vorlesungen und Praktika
Buch (2022)
Hanser, Carl (Verlag)
CHF 69,95