期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Possibility of Applying Spectral Redundancy in Coherent DWDM Systems for Increasing the Data Transmission Rate and Decreasing Nonlinear Effects and Double Rayleigh Scattering with Great Security of Data
1
作者 Alexander Nekuchaev Sergey Shuteev 《Open Journal of Applied Sciences》 2016年第2期89-94,共6页
A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of ... A new method coherent DWDM system has been proposed. Standard method uses 90 wavelengths with channel capacity 100 G, so total capacity amounts to 9 Terabit, optical power is P. New “channel super” (CS) consists of 15 wavelengths, number of CS is 6, so total number of wavelengths is 90 too, total capacity is 6 Terabit, but optical power is 4/15P. Over ULH and EULH markets, standard approach will be forced to reduce the total capacity to 2.4 Terabit with optical power 4/15P as in proposed method. But the new can reach 6 Terabit with the same optical power 4/15P. 展开更多
关键词 Coherent Communications optical security and encryption Fiber Optics Links and Subsystems
在线阅读 下载PDF
Secret key exchange in ultralong lasers by radiofrequency spectrum coding 被引量:2
2
作者 Alessandro Tonello Alain Barthelemy +6 位作者 Katarzyna Krupa Vincent Kermene Agnes Desfarges-Berthelemot Badr Mohamed Shalaby Sonia Boscolo Sergei K Turitsyn Juan Diego Ania-Castanon 《Light(Science & Applications)》 SCIE EI CAS CSCD 2015年第1期400-404,共5页
We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results sho... We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultralong fiber laser.This new concept is supported by experimental results showing how the radiofrequency spectrum of the laser can be exploited as a carrier to exchange information.The test bench for our proof of principle is a 50-km-long fiber laser linking two users,Alice and Bob,where each user can randomly add an extra 1-km-long segment of fiber.The choice of laser length is driven by two independent random binary values,which makes such length become itself a random variable.The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and,hence,to the same free spectral range. 展开更多
关键词 fiber lasers fiber optics communications optical security and encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部