18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figura 6. Número <strong>de</strong> mensagens trocadas até a sincronização, com K variável.<br />

Fonte: próprio autor<br />

Referências<br />

Allam, A. M. e Abbas, H. M. (2010). On the improvement of neural cryptography<br />

using erroneous transmitted information with error prediction. Trans.<br />

Neur. Netw., 21:1915–1924.<br />

Braga, A., Carvalho, A., e Lu<strong>de</strong>rmir, T. (2007). Re<strong>de</strong>s Neurais Artificiais: Teoria e<br />

Aplicações. LTC, 2nd edition.<br />

Burnett, S. e Paine, S. (2001). The RSA Security’s Official Gui<strong>de</strong> to Cryptography.<br />

Osborne/McGraw-Hill, Berkeley, CA, USA.<br />

Firmino Filho, J. (2009). Implementação e análise <strong>de</strong> <strong>de</strong>sempenho dos protocolos<br />

<strong>de</strong> criptografia neural e diffie-hellman em sistemas rfid utilizando uma plataforma<br />

embarcada. Universida<strong>de</strong> Fe<strong>de</strong>ral do Rio Gran<strong>de</strong> do Norte, page 61.<br />

Haykin, S. (1999). Neural networks: a comprehensive foundation. Prentice Hall.<br />

Kanter, I., Kinzel, W., e Kanter, E. (2002). Secure exchange of information by<br />

synchronization of neural networks. Europhysics Letters, 57(1):11.<br />

Kinzel, W. e Kanter, I. (2002). Neural cryptography. In in Proc. of the 9th International<br />

Conference on Neural Information Processing, pages 18–22.<br />

Prabakaran, N. e P., V. (2010). A new security on neural cryptography with queries.<br />

Int. J. of Advanced Networking and Applications, pages 437–444.<br />

Russell, S. e Norvig, P. (2010). Artificial intelligence: a mo<strong>de</strong>rn approach. Prentice<br />

Hall series in artificial intelligence. Prentice Hall, 3rd edition.<br />

Ruttor, A. (2007). Neural synchronization and cryptography. arXiv, page 120.<br />

Terada, R. (2008). Segurança <strong>de</strong> Dados: Criptografia em Re<strong>de</strong> <strong>de</strong> Computador.<br />

Edgard Blucher, 2nd edition.<br />

319

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!