Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
voice encryption
biblio
Two-level chaotic system versus non-autonomous modulation in the context of chaotic voice encryption
Submitted by grigby1 on Thu, 06/30/2022 - 4:05pm
Metrics
voice encryption
Non-autonomous modulation
Multilevel Chaotic Security
Lorenz system
Arnold cat map
chaotic cryptography
modulation
Receivers
Ciphers
Cats
real-time systems
chaotic communication
Scalability
Resiliency
resilience
pubcrawl
encryption
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
chaotic algorithm
wireless mobile communication
voice encryption
voice data security
trunked radio
telecommunication technology
security systems
multiple circular chaotic permutation
multiple circular
multicircular permutations
military radio
GSM network
Global System for Mobile
end-to-end voice encryption
dynamic keys
Cryptography
cellular technologies
voice communication
chaotic cryptography
chaotic communication
Predictive Metrics
GSM
cellular radio
composability
pubcrawl
Resiliency
telecommunication security
Receivers
encryption