资讯

This article conducts a security analysis of an image encryption algorithm that employs 2-D lag-complex logistic map (LCLM) as a pseudorandom number generator (PRNG). This algorithm uses the sum of ...
It is organized into 17 sections which discuss the present and future challenges, state-of-the-art technology, and real-world solutions to address the security challenges facing our society. Word ...