共 16 条
[1]
Abdullah Hikmat N., 2017, 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), P121, DOI 10.1109/CRCSIT.2017.7965545
[3]
Belazi A, 2015, INT WIREL COMMUN, P611, DOI 10.1109/IWCMC.2015.7289153
[5]
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[6]
Feldhofer M., 2004, STRONG AUTHENTICATIO, P357
[8]
Hämäläinen P, 2006, DSD 2006: 9TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN: ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS, P577
[10]
An intertwining chaotic maps based image encryption scheme
[J].
NONLINEAR DYNAMICS,
2012, 69 (04)
:1995-2007