{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:31:11Z","timestamp":1729668671201,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/csndsp.2014.6923987","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:13:31Z","timestamp":1414008811000},"page":"1065-1070","source":"Crossref","is-referenced-by-count":1,"title":["Chaotic cryptosystems in communication within an LPV framework"],"prefix":"10.1109","author":[{"given":"G.","family":"Millerioux","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4740-9"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-0231-5"},{"key":"16","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1137\/100819011","article-title":"Title","author":"goldsztejn","year":"2011","journal-title":"SIAM J APPLIED DYNAMICAL SYSTEMS"},{"journal-title":"LMI Solver","year":"0","author":"de oliveira","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36110-4_5"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36110-4","author":"sename","year":"2013","journal-title":"Robust Control and Linear Parameter Varying Approaches Application to Vehicle Dynamics Vol 437 of Lecture Notes in Control and Information Sciences"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970777"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127498000450"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/81.246145"},{"key":"1","volume":"2","author":"knuth","year":"1998","journal-title":"The art of computer programming"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127497001266"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/81.633877"},{"journal-title":"Chaos Sync and Cryptography for Secure Communications Applications for Encryption","year":"2010","author":"banerjee","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.916555"},{"key":"4","article-title":"A survey of chaotic secure communication systems","author":"yang","year":"2004","journal-title":"Int J of Computational Cognition"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127497000194"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/81.633891"}],"event":{"name":"2014 9th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP)","start":{"date-parts":[[2014,7,23]]},"location":"Manchester, UK","end":{"date-parts":[[2014,7,25]]}},"container-title":["2014 9th International Symposium on Communication Systems, Networks &amp; Digital Sign (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6913114\/6923783\/06923987.pdf?arnumber=6923987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:52:14Z","timestamp":1498171934000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6923987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csndsp.2014.6923987","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}