1 |
C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 797-780.
과학기술학회마을
|
2 |
C.-K. Lee and W.-Y. Jeong, "A Study on Authentication Algorithm for NFC Security Channel," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 805-810.
과학기술학회마을
|
3 |
S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014. pp. 261-266.
과학기술학회마을
DOI
|
4 |
F. C. M. Lau and C. K. Tse, Chaos-Based Digital Communication Systems. Berlin: Springer, 2003.
|
5 |
H. Zhang, D, Liu, and Z, Wang, Controlling Chaos. London: Springer, 2009.
|
6 |
L. Kocarev and S. Lian, Chaos-Based Cryptography. Berlin: Springer, 2011.
|
7 |
G.-S. Yim and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, 2008, pp. 155-162.
과학기술학회마을
|
8 |
G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, vol. 8. no. 3, 2008, pp. 57-64.
과학기술학회마을
|
9 |
H.-S. Kim and G.-S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, vol. 16, no. 2, 2011, pp. 201-206.
과학기술학회마을
DOI
|
10 |
H. G. Schuster, Deterministic Chaos an Introduction. 2nd, Weinheim: VCH, 1988.
|
11 |
G. P. Williams, Chaos Theory Tamed. London: Taylor & Francis, 1997.
|
12 |
E. Ott, Chaos in dynamical systems. New York: Cambridge University Press, 1993.
|
13 |
G. L. Baker and J. P. Gollub, Chaotic Dynamics 2nd. New York: Cambridge University Press, 1996.
|
14 |
A. H. Nayfeh and B. Balachandran, Applied Nonlinear Dynamics. Toronto: Wiley-Interscience, 1995.
|
15 |
J. C. Yen and J. I. Guo "A new chaotic key-based design for image encryption and decryption," The 2000 IEEE Int. Symp. on Circuits and Systems, Geneva, Switzerland, May 2000, pp. 49-52.
|
16 |
H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher for Image Encryption and Decryption," Information, vol. 31, 2007. pp. 121-129.
|
17 |
F. Fu, Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme," Int. Conf. on Computer Science 2007, Beijing, China, June 2007, pp. 575-582.
|