This work is licensed under the Creative Commons Attribution 4.0 International License.
Amine, Z., Naima, H. S., & Ali-Pacha, A. (2022). A secure hash function based on sponge construction and chaos-maps. International Journal of Computational Science and Engineering, 25(3), 285-297.Search in Google Scholar
Jabeen, T., Ashraf, H., & Ullah, A. (2021). A survey on healthcare data security in wireless body area networks. Journal of ambient intelligence and humanized computing, 12(10), 9841-9854.Search in Google Scholar
Mei, D. (2022). What does students’ experience of e-portfolios suggest. Applied Mathematics and Nonlinear Sciences, 7(2), 15-20.Search in Google Scholar
Rahaman, H., Kamrul Hasan, M., Ali, A. & Shamsul Alam, M. (2021). Implicit Methods for Numerical Solution of Singular Initial Value Problems. Applied Mathematics and Nonlinear Sciences, 6(1), 1-8.Search in Google Scholar
Liu, H., Wang, X., & Kadir, A. (2021). Constructing chaos-based hash function via parallel impulse perturbation. Soft Computing, 25(16), 11077-11086.Search in Google Scholar
Chai, X., Fu, X., Gan, Z., Zhang, Y., Lu, Y., & Chen, Y. (2020). An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Computing and Applications, 32(9), 4961-4988.Search in Google Scholar
AbdElminaam, D., & Abdullah Ibrahim, M. (2022). FHE-Chaos NHCP: Developing a Novel Secure Framework for Cloud Computing Environment. Journal of Computing and Communication, 1(1), 12-26.Search in Google Scholar
Aouissaoui, I., Bakir, T., & Sakly, A. (2021). Robustly correlated key-medical image for DNA-chaos based encryption. IET Image Processing, 15(12), 2770-2786.Search in Google Scholar
Huang, R., Liao, X., Dong, A., & Sun, S. (2020). Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm. Multimedia Tools and Applications, 79(37), 27483-27509.Search in Google Scholar
Kaur, G., Singh, K., & Gill, H. S. (2021). Chaos-based joint speech encryption scheme using SHA-1. Multimedia tools and applications, 80(7), 10927-10947.Search in Google Scholar
Abdoun, N., El Assad, S., Deforges, O., Assaf, R., & Khalil, M. (2020). Design and security analysis of two robust keyed hash functions based on chaotic neural networks. Journal of Ambient Intelligence and Humanized Computing, 11(5), 2137-2161.Search in Google Scholar
Mishra, D., Obaidat, M. S., Rana, S., Dharminder, D., Mishra, A., & Sadoun, B. (2020). Chaos-based content distribution framework for digital rights management system. IEEE Systems Journal, 15(1), 570-576.Search in Google Scholar