{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:26:33Z","timestamp":1771003593938,"version":"3.50.1"},"reference-count":16,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.3233\/jcm-193840","type":"journal-article","created":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T07:28:36Z","timestamp":1568791716000},"page":"1083-1092","source":"Crossref","is-referenced-by-count":0,"title":["Security and confidentiality of network communication using chaotic encryption technology"],"prefix":"10.1177","volume":"19","author":[{"given":"Zhongmin","family":"Cai","sequence":"first","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/JCM-193840_ref1","unstructured":"V. Duddu and D. Samanta, Network and security analysis of anonymous communication networks, 2018."},{"key":"10.3233\/JCM-193840_ref2","doi-asserted-by":"crossref","unstructured":"Q. Huang, Analysis on the security enhancement model of communication system based on chaotic encryption and analytic hierarchy process, (10) (2016), 28\u201330.","DOI":"10.12783\/dtssehs\/asshm2016\/8364"},{"key":"10.3233\/JCM-193840_ref3","first-page":"1","article-title":"A 7-D Hyperchaotic System Based Encryption Scheme for Secure Fast-OFDM-PON","author":"Hu","year":"2018","journal-title":"Journal of Lightwave Technology"},{"issue":"5","key":"10.3233\/JCM-193840_ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0129183117500693","article-title":"A novel image encryption algorithm based on the chaotic system and DNA computing","volume":"28","author":"Chai","year":"2017","journal-title":"International Journal of Modern Physics C"},{"issue":"12","key":"10.3233\/JCM-193840_ref5","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1364\/JOCN.9.001184","article-title":"A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2","volume":"9","author":"Gill","year":"2017","journal-title":"Journal of Optical Communications and Networking"},{"issue":"1","key":"10.3233\/JCM-193840_ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2017.2661581","article-title":"A Key Space Enhanced chaotic encryption scheme for physical layer security in OFDM-PON","volume":"9","author":"Bi","year":"2017","journal-title":"IEEE Photonics Journal"},{"issue":"22","key":"10.3233\/JCM-193840_ref8","doi-asserted-by":"crossref","first-page":"220505","DOI":"10.7498\/aps.62.220505","article-title":"Characteristics of time-delay complex Lorenz chaotic system and its self-synchronization of time delay","volume":"62","author":"Zhang","year":"2013","journal-title":"Acta Physica Sinica"},{"issue":"13","key":"10.3233\/JCM-193840_ref9","doi-asserted-by":"crossref","first-page":"6","DOI":"10.5120\/21598-4702","article-title":"A review on multiple chaotic maps for image encryption with cryptographic technique","volume":"121","author":"Chandra","year":"2015","journal-title":"International Journal of Computer Applications"},{"issue":"5","key":"10.3233\/JCM-193840_ref10","doi-asserted-by":"crossref","first-page":"e0158348","DOI":"10.1371\/journal.pone.0158348","article-title":"Design and hardware implementation of a new chaotic secure communication technique","volume":"11","author":"Xiong","year":"2016","journal-title":"PLOS ONE"},{"issue":"9","key":"10.3233\/JCM-193840_ref11","doi-asserted-by":"crossref","first-page":"090504","DOI":"10.1088\/1674-1056\/25\/9\/090504","article-title":"Period-control and chaos-anti-control of a semiconductor laser using the twisted fiber","volume":"25","author":"Yan","year":"2016","journal-title":"Chinese Physics B"},{"issue":"2","key":"10.3233\/JCM-193840_ref12","first-page":"1","article-title":"Mixed H2\/H\u221e-based actuator selection for uncertain polytopic systems with regional pole placement","volume":"91","author":"Argha","year":"2017","journal-title":"International Journal of Control"},{"issue":"3","key":"10.3233\/JCM-193840_ref13","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2016.77","article-title":"Putting the \u201cSystems\u201d in security engineering: an examination of NIST special publication 800-160","volume":"14","author":"Mailloux","year":"2016","journal-title":"IEEE Security & Privacy"},{"issue":"11","key":"10.3233\/JCM-193840_ref14","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.sysconle.2010.08.005","article-title":"Robust interval observers for global Lipschitz uncertain chaotic systems","volume":"59","author":"Moisan","year":"2010","journal-title":"Systems & Control Letters"},{"key":"10.3233\/JCM-193840_ref15","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.pisc.2016.03.007","article-title":"Random multiple key streams for encryption with added CBC mode of operation","volume":"8","author":"Penchalaiah","year":"2016","journal-title":"Perspectives in Science"},{"key":"10.3233\/JCM-193840_ref16","unstructured":"V.K.Y. Wu and R.H. Campbell, Password streaming for RFID privacy, on the move to meaningful internet systems: OTM 2008 workshops, Springer Berlin Heidelberg, (2008)."},{"key":"10.3233\/JCM-193840_ref17","doi-asserted-by":"crossref","unstructured":"Y. He et al., A novel trellis-coded differential chaotic modulation system, IEEE (2017).","DOI":"10.1109\/WTS.2017.7943522"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-193840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:32:28Z","timestamp":1771000348000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-193840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":16,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jcm-193840","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,11]]}}}