UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-3 of 3 Help

Filters            
Selected(0)Clear Items/Page:    Sort:
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2014,Volume: 45,Issue: 9,Page: 2001
Authors:  Zhou Y.;  Hua Z.;  Pun C.-M.;  Philip Chen C.L.
Favorite  |  View/Download:13/0  |  Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
Image encryption using P-Fibonacci transform and decomposition Journal article
Optics Communications, 2012,Volume: 285,Issue: 5,Page: 594
Authors:  Zhou Y.;  Panetta K.;  Agaian S.;  Chen C.L.P.
Favorite  |  View/Download:22/0  |  Submit date:2018/10/30
Fibonacci P-code Bit-plane Decomposition  Image Encryption  P-fibonacci Transform  Privacy Protection  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:1153/263  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid