Optical layer security in fiber-optic networks

MP Fok, Z Wang, Y Deng… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The physical layer of an optical network is vulnerable to a variety of attacks, including
jamming, physical infrastructure attacks, eavesdrop**, and interception. As the demand for …

Deterministic aperiodic nanostructures for photonics and plasmonics applications

L Dal Negro, SV Boriskina - Laser & Photonics Reviews, 2012 - Wiley Online Library
This review focuses on the optical properties and device applications of deterministic
aperiodic media generated by mathematical rules with spectral features that interpolate in a …

An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images

P Puteaux, W Puech - IEEE transactions on information …, 2018 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an effective technique to embed data
in the encrypted domain. An original image is encrypted with a secret key and during or after …

[LIBRO][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[LIBRO][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

[LIBRO][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

[LIBRO][B] Elliptic curves: number theory and cryptography

LC Washington - 2008 - taylorfrancis.com
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second
Edition develops the theory of elliptic curves to provide a basis for both number theoretic and …

Enhancing source-location privacy in sensor network routing

P Kamat, Y Zhang, W Trappe… - 25th IEEE international …, 2005 - ieeexplore.ieee.org
One of the most notable challenges threatening the successful deployment of sensor
systems is privacy. Although many privacy-related issues can be addressed by security …

Color image encryption based on chaotic systems and elliptic curve ElGamal scheme

J Wu, X Liao, B Yang - Signal Processing, 2017 - Elsevier
Color image can provide more information than gray image, so it is used more widely in the
field of the communication. In recent years, how to safely encrypt images has received …

Using the physical layer for wireless authentication in time-variant channels

L **ao, LJ Greenstein, NB Mandayam… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The wireless medium contains domain-specific information that can be used to complement
and enhance traditional security mechanisms. In this paper we propose ways to exploit the …