Search Books
Computer Access for People … Automatic Defense Against Z…

Discrete Dynamical Systems and Chaotic Machines: Theory and Applications (Chapman & Hall/CRC Numerical Analysis and Scientific Computing Series)

Author Jacques M. Bahi, Christophe Guyeux
Publisher CRC Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
72.25 94.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $71.20

✓ Usually ships in 24 hours

Share:
Book Details
PublisherCRC Press
ISBN / ASIN1466554509
ISBN-139781466554504
AvailabilityUsually ships in 24 hours
Sales Rank3,937,446
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science.

Covering both theoretical and practical aspects, the book presents:

  • Key mathematical and physical ideas in chaos theory
  • Computer science fundamentals, clearly establishing that chaos properties can be satisfied by finite state machines
  • Concrete applications of chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography
  • Concrete applications of chaotic machines in wireless sensor networks, including secure data aggregation and video surveillance

Until the authors’ recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book illustrates how chaos theory enables the study of computer security problems, such as steganalysis, that otherwise could not be tackled. It also explains how the theory reinforces existing cryptographically secure tools and schemes.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View