Communication security using chaotic generator | IEEE Conference Publication | IEEE Xplore