{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:49Z","timestamp":1729616689872,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199069","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Implementation of a Chaotically Encrypted Wireless Communication System"],"prefix":"10.1109","author":[{"given":"A. M.","family":"Abid","sequence":"first","affiliation":[]},{"given":"Q.","family":"Nasir","sequence":"additional","affiliation":[]},{"given":"A. S.","family":"Elwakil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/81.633892"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/81.964416"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"article-title":"techniques in secure chaos communication","year":"2006","author":"lau","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/78.757236"},{"key":"12","first-page":"195","article-title":"secure digital communication using chaotic symbolic dynamics","volume":"14","author":"kurian","year":"2006","journal-title":"Turk J Electrical Engineering"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2005.1600703"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2005.334457"},{"key":"1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.micpro.2005.04.004","article-title":"a robust secure speech communication system using itu-t g.723.1 and tms320c6711 dsp","volume":"30","author":"ahmed","year":"2006","journal-title":"Microprocess Microsyst"},{"key":"10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/S1004-4132(06)60008-X","article-title":"implementation of a new chaotic encryption system and synchronization","volume":"17","author":"min","year":"2006","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/81.903194"},{"article-title":"analyses and new designs of digital chaotic ciphers","year":"2003","author":"li","key":"6"},{"key":"5","first-page":"800","author":"rukhin","year":"0","journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"},{"key":"4","first-page":"132","article-title":"a secure voice communication system based on dsp","volume":"1","author":"lei","year":"2004","journal-title":"Control Automation Robotics and Vision Conference 8th ICARCV"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/81.350802"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/20\/2\/308"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199069.pdf?arnumber=5199069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:41Z","timestamp":1497825881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199069","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}