2012 20th Telecommunications Forum (TELFOR) 2012
DOI: 10.1109/telfor.2012.6419362
|View full text |Cite
|
Sign up to set email alerts
|

Securing data on fiber optic transmission lines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…However imperfection of the equipment used for the construction of these systems makes them vulnerable to wiretapping. This is involved with limitation of the safety and security of the data transmission, as confirmed by ongoing research [11][12][13][14][15].…”
Section: Figurementioning
confidence: 91%
“…However imperfection of the equipment used for the construction of these systems makes them vulnerable to wiretapping. This is involved with limitation of the safety and security of the data transmission, as confirmed by ongoing research [11][12][13][14][15].…”
Section: Figurementioning
confidence: 91%
“…The phase selection is FIGURE 5 The control circuit block diagram conducted by using a 16 × 1 multiplexer. The number of clock phases can be increased by increasing the number of the delay units.…”
Section: Adcdr Designmentioning
confidence: 99%
“…The number of clock phases used in the proposed architecture is 16. The phase selection is FIGURE 5 The control circuit block diagram conducted by using a 16 × 1 multiplexer. The phase selector block selects one of the generated clock phases depending on the output of the counter.…”
Section: Adcdr Designmentioning
confidence: 99%
See 2 more Smart Citations