Abstract
Secure communication using chaotic systems is considered from a control point of view. It is shown that a synchronization-based scheme for secure communication described in the literature may in fact be interpreted as an adaptive identification scheme. Two examples where the existing scheme fails to achieve the reconstruction of an encoded message are treated using adaptive identification techniques.
Original language | English |
---|---|
Title of host publication | Proceedings of the 37th IEEE Conference on Decision and Control |
Subtitle of host publication | December 16-18, 1998, Hyatt Regency Westshore, Tampa, Florida |
Place of Publication | Piscataway, NJ, USA |
Publisher | IEEE |
Pages | 1957-1962 |
Number of pages | 6 |
Volume | 2 |
ISBN (Print) | 0-7803-4394-8 |
DOIs | |
Publication status | Published - 16 Dec 1998 |
Event | 37th IEEE Conference on Decision and Control, CDC 1998 - Hyatt Regency Westshore, Tampa, United States Duration: 16 Dec 1998 → 18 Dec 1998 Conference number: 37 |
Publication series
Name | Proceedings IEEE Conference on Decision and Control (CDC) |
---|---|
Publisher | IEEE |
ISSN (Electronic) | 0191-2216 |
Conference
Conference | 37th IEEE Conference on Decision and Control, CDC 1998 |
---|---|
Abbreviated title | CDC |
Country | United States |
City | Tampa |
Period | 16/12/98 → 18/12/98 |