For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite mac

part 1|2 pages

Part I: An introduction to chaos

chapter 1|10 pages

Classical Examples by Way of Introduction

part 2|2 pages

Part II: The mathematical theory of chaos

chapter 2|6 pages

Definitions and Notations

chapter 3|16 pages

Devaney’s Formulation of Chaos

chapter 4|8 pages

Other Formulations of Chaos

part 3|2 pages

Part III: From theory to practice

chapter 5|20 pages

A Fundamental Tool: The Chaotic Iterations

chapter 6|4 pages

Theoretical Proofs of Chaotic Machines

part 4|2 pages

Part IV: Applications of chaos in the computer science field

chapter 7|76 pages

Information Security

chapter 8|40 pages

Wireless Sensor Networks

part 5|2 pages

Part V: Conclusion

chapter 9|6 pages