Optical layer security in fiber-optic networks
The physical layer of an optical network is vulnerable to a variety of attacks, including
jamming, physical infrastructure attacks, eavesdrop**, and interception. As the demand for …
jamming, physical infrastructure attacks, eavesdrop**, and interception. As the demand for …
Deterministic aperiodic nanostructures for photonics and plasmonics applications
This review focuses on the optical properties and device applications of deterministic
aperiodic media generated by mathematical rules with spectral features that interpolate in a …
aperiodic media generated by mathematical rules with spectral features that interpolate in a …
An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images
Reversible data hiding in encrypted images (RDHEI) is an effective technique to embed data
in the encrypted domain. An original image is encrypted with a secret key and during or after …
in the encrypted domain. An original image is encrypted with a secret key and during or after …
[LIBRO][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
[LIBRO][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
[LIBRO][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …
[LIBRO][B] Elliptic curves: number theory and cryptography
LC Washington - 2008 - taylorfrancis.com
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second
Edition develops the theory of elliptic curves to provide a basis for both number theoretic and …
Edition develops the theory of elliptic curves to provide a basis for both number theoretic and …
Enhancing source-location privacy in sensor network routing
One of the most notable challenges threatening the successful deployment of sensor
systems is privacy. Although many privacy-related issues can be addressed by security …
systems is privacy. Although many privacy-related issues can be addressed by security …
Color image encryption based on chaotic systems and elliptic curve ElGamal scheme
J Wu, X Liao, B Yang - Signal Processing, 2017 - Elsevier
Color image can provide more information than gray image, so it is used more widely in the
field of the communication. In recent years, how to safely encrypt images has received …
field of the communication. In recent years, how to safely encrypt images has received …
Using the physical layer for wireless authentication in time-variant channels
The wireless medium contains domain-specific information that can be used to complement
and enhance traditional security mechanisms. In this paper we propose ways to exploit the …
and enhance traditional security mechanisms. In this paper we propose ways to exploit the …