{"id":7369,"date":"2018-01-10T10:37:14","date_gmt":"2018-01-10T10:37:14","guid":{"rendered":"http:\/\/cio.edu.umh.es\/?p=7369"},"modified":"2018-01-10T10:37:14","modified_gmt":"2018-01-10T10:37:14","slug":"english-millerioux-g-amigo-j-m-daafouz-j-2008-a-connection-between-chaotic-and-conventional-cryptography-ieee-transactions-on-circuits-and-systems-i","status":"publish","type":"post","link":"https:\/\/cio.umh.es\/en\/2018\/01\/10\/english-millerioux-g-amigo-j-m-daafouz-j-2008-a-connection-between-chaotic-and-conventional-cryptography-ieee-transactions-on-circuits-and-systems-i\/","title":{"rendered":"(English) Millerioux, G., Amig\u00f3, J.M., Daafouz, J., (2008), \u201cA connection between chaotic and conventional cryptography\u201d, IEEE Transactions on Circuits and Systems I"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":3477,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[7834],"tags":[372931],"_links":{"self":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts\/7369"}],"collection":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/users\/3477"}],"replies":[{"embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/comments?post=7369"}],"version-history":[{"count":0,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/posts\/7369\/revisions"}],"wp:attachment":[{"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/media?parent=7369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/categories?post=7369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cio.umh.es\/en\/wp-json\/wp\/v2\/tags?post=7369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}