[1] |
SHANNON C E . Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949,28(4):656-715.
|
[2] |
SHANNON C E . A mathematical theory of communication[J]. Bell System Technical Journal, 1948,27(3):3-55.
|
[3] |
DACHSELT F , SCHWARZ W . Chaos and cryptography[J]. IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications, 2001,48(12):1498-1509.
|
[4] |
SARKAR M , CHAUDHURI R R , CHOWDHURY S D , et al. Onset of chaos for different non linear systems by varying system parameters[M]. Advances in Optical Science and Engineering.Springer India, 2015:383-396.
|
[5] |
ZHANG H , WANG X F , LI Z H , et al. A new image encryption algo-rithm based on chaos system[C]// IEEE Inter Conf on Robotics, Intelligent Systems and Signal Processing. c2003:778-782.
|
[6] |
ALVAREZ G , MONTOYA F , ROMERA M , et al. Breaking two secure communication systems based on chaotic masking[J]. IEEE Trans on Circuits and Systems-II, 2004,51(10):505-506.
|
[7] |
OZDEMIR M K , ARSLAN H . Channel estimation for wireless OFDM systems[J]. IEEE Commu Surveys & Tutorials, 2007,9(2):18-48.
|
[8] |
KHAN M A , ASIM M , JEOTI V , et al. Chaos based constellation scrambling in OFDM systems: security & interleaving issues[C]// IEEE Inter Sympos on Information Technology. c2008:1-7.
|
[9] |
LIU B , ZHANG L , XIN X . layer security in OFDM-PON based on dimension transformed chaotic permutation[J]. IEEE Photonics Technology Letters, 2014,26(2):127-130.
|
[10] |
ZHANG L J . Theory and performance analyses in secure CO-OFDM transmission system based on two-dimensional permutation[J]. IEEE Photonics Technology Letters, 2013,31(1):74-80.
|
[11] |
LUENGO D , SANTAMARIA I . Secure communications using OFDM with chaotic modulation in the subcarriers[C]// IEEE Vehicular Technology Conference. c2005:1022-1026.
|
[12] |
廖旎焕, 高金峰 . 广义映射混沌扩频序列及其特性分析[J]. 电子与信息学报. 2006,28(7):1255-1257. LIAO N H , GAO J F . The chaotic spreading sequences generated by the extended chaotic map and its performance analysis[J]. Journal of Electronics & Information Technology, 2006,28(7):1255-1257.
|
[13] |
范九伦, 张雪锋 . 分段Logistic混沌映射及其性能分析[J]. 电子学报, 2009,37(4):720-725. FAN J L , ZHANG X F . Piecewise logistic chaotic map and its per-formance analysis[J]. Acta Electronica Sinica, 2009,37(4):720-725.
|
[14] |
SHIU Y S , CHANG S Y , WU H C , et al. Physical layer security in wireless networks: a tutorial[J]. IEEE Wireless Communications, 2011,18(2):66-74.
|