发展中国家混沌密码学文献计量学研究

Salma Ben Mamia, J. Kasperiūnienė, W. Puech, K. Bouallegue
{"title":"发展中国家混沌密码学文献计量学研究","authors":"Salma Ben Mamia, J. Kasperiūnienė, W. Puech, K. Bouallegue","doi":"10.1109/SETIT54465.2022.9875676","DOIUrl":null,"url":null,"abstract":"In this paper, an analyse of scientific journal articles related to chaotic cryptography from 2015 to 2021, is presented. In doing so, the study uses the Web of Science Core Collection database to analyze the data. ‘biblioshiny’ a web-interface of the ‘bibliometrix 3.0’ package of R-studio has been deployed to conduct bibliometric analysis. Also, a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer software, was developed. The study relies on the proposed approach to explore the influence of developing countries on Chaos-based encryption. We found out that developing countries are the most active on chaotic cryptography.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Bibliometric study about chaotic cryptography in developing countries\",\"authors\":\"Salma Ben Mamia, J. Kasperiūnienė, W. Puech, K. Bouallegue\",\"doi\":\"10.1109/SETIT54465.2022.9875676\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an analyse of scientific journal articles related to chaotic cryptography from 2015 to 2021, is presented. In doing so, the study uses the Web of Science Core Collection database to analyze the data. ‘biblioshiny’ a web-interface of the ‘bibliometrix 3.0’ package of R-studio has been deployed to conduct bibliometric analysis. Also, a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer software, was developed. The study relies on the proposed approach to explore the influence of developing countries on Chaos-based encryption. We found out that developing countries are the most active on chaotic cryptography.\",\"PeriodicalId\":126155,\"journal\":{\"name\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SETIT54465.2022.9875676\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SETIT54465.2022.9875676","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文对2015年至2021年与混沌密码学相关的科学期刊文章进行了分析。在此过程中,该研究使用Web of Science Core Collection数据库来分析数据。“biblioshiny”是R-studio的“bibliometrix 3.0”软件包的一个网络界面,用于进行文献计量分析。此外,利用相似度可视化(VOS)查看器软件,开发了文献计量资料的图形映射。该研究依赖于提出的方法来探索发展中国家对基于混沌的加密的影响。我们发现,发展中国家对混沌密码最为活跃。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Bibliometric study about chaotic cryptography in developing countries
In this paper, an analyse of scientific journal articles related to chaotic cryptography from 2015 to 2021, is presented. In doing so, the study uses the Web of Science Core Collection database to analyze the data. ‘biblioshiny’ a web-interface of the ‘bibliometrix 3.0’ package of R-studio has been deployed to conduct bibliometric analysis. Also, a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer software, was developed. The study relies on the proposed approach to explore the influence of developing countries on Chaos-based encryption. We found out that developing countries are the most active on chaotic cryptography.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Comparison of Machine Learning Methods for best Accuracy COVID-19 Diagnosis Using Chest X-Ray Images Design and Simulation of a PV System Controlled through a Hybrid INC-PSO Algorithm using XSG Tool Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes Preliminary Study Of A Smart Computer System For Scholar Support Distributed Consensus Control for Multi-Agent Oscillatory Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1