Multiwavelength securely-authenticated broadcast network

被引:0
|
作者
Nishikido, J [1 ]
Hiramatsu, A [1 ]
Ogawara, M [1 ]
Tsukada, M [1 ]
Yukimatsu, K [1 ]
机构
[1] NTT, Network Serv Syst Labs, Tokyo 180, Japan
关键词
D O I
暂无
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A WDM photonic switching network based on a broadcast-and-select method is presented. Its channel selectors feature secure access authentication under the control of the network. Three prototype systems have been experimentally demonstrated by using WDM/TDM and WDM/SCM (16-QAM and 64-QAM) technologies.
引用
收藏
页码:17 / 20
页数:4
相关论文
共 50 条
  • [21] Authenticated Distributed Device Network
    Garde, Sapana
    [J]. 2012 1ST INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGY TRENDS IN ELECTRONICS, COMMUNICATION AND NETWORKING (ET2ECN), 2012,
  • [22] Authenticated secure group communication using broadcast encryption key computation
    Aparna, R.
    Amberker, B. B.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 348 - +
  • [23] A European multiwavelength optical network
    ElBawab, TS
    OMahony, MJ
    Jayasumana, AP
    [J]. SECOND IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1997, : 568 - 573
  • [24] RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral
    Ordu, Arif Burak
    Bayar, Mehmet
    Ors, Berna
    [J]. 2022 THIRTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2022, : 167 - 173
  • [25] Traffic optimization and reconfiguration management of multiwavelength multihop broadcast lightwave networks
    Labourdette, JFP
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (9-10): : 981 - 998
  • [26] Side-mode suppressed multiwavelength fiber laser and broadcast transmission
    Lee, Kwanil
    Lee, Sang Bae
    Lee, Ju Han
    Kim, Chul Han
    Han, Young-Geun
    [J]. 2008 CONFERENCE ON OPTICAL FIBER COMMUNICATION/NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, VOLS 1-8, 2008, : 1728 - +
  • [27] Authenticated access to reserved network resources
    Calvert, Kenneth L.
    Venkatraman, Srinivasan
    Griffioen, James N.
    [J]. International Journal of Network Security, 2006, 3 (01) : 54 - 64
  • [28] Authenticated teleportation and verification in a noisy network
    Unnikrishnan, Anupama
    Markham, Damian
    [J]. PHYSICAL REVIEW A, 2020, 102 (04)
  • [29] Authenticated public key broadcast encryption scheme secure against insiders' attack
    Park, Chanil
    Hur, Junbeom
    Hwang, Seongoun
    Yoon, Hyunsoo
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 113 - 122
  • [30] FRACTIONAL ETERNAL DOMINATION: SECURELY DISTRIBUTING RESOURCES ACROSS A NETWORK
    Devvrit, Fnu
    Krim-Yee, Aaron
    Kumar, Nithish
    MacGillivray, Gary
    Seamone, Ben
    Virgile, Virgelot
    Xu, Anqi
    [J]. DISCUSSIONES MATHEMATICAE GRAPH THEORY, 2024, 44 (04) : 1395 - 1428