provides confidentiality, message authentication, and replay protection for the Real-time Transport Protocol (RTP) traffic. There are common encryption algorithms that have been developed to protect data such as advanced encryption algorithm (AES). Chaotic encryption is new trend in cryptography based on chaos theory. Chaos is a class of complex behaviors that can emerge from nonlinear dynamical systems. A distinctive and readily observable property of chaotic systems is sensitive dependence on initial conditions. The main purpose of this paper is to propose an alternative scheme to provide confidentiality in SRTP using chaotic systems. The proposed scheme is implemented using Microsoft open source project for conference. The Chaos Based SR...
Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need t...
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mism...
This report is regarded as secure communication using chaotic dynamics. The nature of erratic behavi...
In this article, a new algorithm that can encrypt data on TCP data segment by using a novel chaotic ...
Abstract — E-mail service is one of the most important Internet services. E-mail security includes c...
Wireless communication networks use interconnected devices within a relatively small area that is ge...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
Chaotic system is a deterministic system with great sensitivity to initial conditions. There are man...
Guaranteeing security in information exchange is a challenge in public networks, such as in the high...
Author name used in this publication: F. C. M. LauAuthor name used in this publication: C. K. TseAut...
International audienceThe modified Lozi system is analyzed as chaotic PRNG and synchronized via obse...
Abstract — The Internet and it is applications are hungry for high level of Quality of Service (QoS)...
The Stream Control Transmission Protocol (SCTP) is acomparatively new transport protocol that presen...
This paper describes BTP, a protocol that ensures the confidential-ity, integrity, authenticity and ...
E-commerce has become critical to everyday life and how businesses and governments operate. The Inte...
Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need t...
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mism...
This report is regarded as secure communication using chaotic dynamics. The nature of erratic behavi...
In this article, a new algorithm that can encrypt data on TCP data segment by using a novel chaotic ...
Abstract — E-mail service is one of the most important Internet services. E-mail security includes c...
Wireless communication networks use interconnected devices within a relatively small area that is ge...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
Chaotic system is a deterministic system with great sensitivity to initial conditions. There are man...
Guaranteeing security in information exchange is a challenge in public networks, such as in the high...
Author name used in this publication: F. C. M. LauAuthor name used in this publication: C. K. TseAut...
International audienceThe modified Lozi system is analyzed as chaotic PRNG and synchronized via obse...
Abstract — The Internet and it is applications are hungry for high level of Quality of Service (QoS)...
The Stream Control Transmission Protocol (SCTP) is acomparatively new transport protocol that presen...
This paper describes BTP, a protocol that ensures the confidential-ity, integrity, authenticity and ...
E-commerce has become critical to everyday life and how businesses and governments operate. The Inte...
Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need t...
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mism...
This report is regarded as secure communication using chaotic dynamics. The nature of erratic behavi...