000 03072cam a2200325Ii 4500
001 9780429096907
008 180331s2013 fluad ob 001 0 eng d
020 _a9780429096907
_q(e-book : PDF)
020 _z9781466554504
_q(hardback)
024 7 _a10.1201/b14979
_2doi
035 _a(OCoLC)850420198
050 4 _aQA76.9.A25
_bB344 2013
082 0 4 _a005.8
_bB151
100 1 _aBahi, Jacques Mohcine.,
_eauthor.
_915274
245 1 0 _aDiscrete dynamical systems and chaotic machines :
_btheory and applications /
_cJacques M. Bahi, Christophe Guyeux.
264 1 _aBoca Raton :
_bCRC Press,
_c2013.
300 _a1 online resource (xvii, 212 pages)
490 1 _aChapman & Hall/CRC numerical analysis and scientific computing
504 _aIncludes bibliographical references (pages 197-209) and index.
505 0 _a1. An introduction to chaos -- 2. The mathematical theory of chaos -- 3. From theory to practice -- 4. Applications of chaos in the computer science field -- 5. Conclusion.
520 _aFor computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science. Covering both theoretical and practical aspects, the book presents: Key mathematical and physical ideas in chaos theory Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance. Until the authors' recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes--
_cProvided by publisher.
650 0 _aComputer security.
_93970
650 0 _aChaotic behavior in systems.
_94594
650 0 _aDynamics.
_915275
700 1 _aGuyeux, Christophe.
_915276
776 0 8 _iPrint version:
_z9781466554504
_w(DLC) 2013013445
830 0 _aChapman & Hall/CRC numerical analysis and scientific computing.
_915277
856 4 0 _uhttps://www.taylorfrancis.com/books/9781466554511
_zClick here to view.
942 _cEBK
999 _c70932
_d70932