{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T04:26:17Z","timestamp":1726028777407},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030141172"},{"type":"electronic","value":"9783030141189"}],"license":[{"start":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T00:00:00Z","timestamp":1552780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14118-9_61","type":"book-chapter","created":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T11:02:59Z","timestamp":1552734179000},"page":"609-622","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Applying Cryptographic Techniques for Securing the Client Data Signals on the Egyptian Optical Transport Network"],"prefix":"10.1007","author":[{"given":"Kamel H.","family":"Rahoma","sequence":"first","affiliation":[]},{"given":"Ayman A.","family":"Elsayed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,17]]},"reference":[{"issue":"8","key":"61_CR1","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2016.7537185","volume":"54","author":"N Skorin-Kapov","year":"2016","unstructured":"Skorin-Kapov, N., et al.: Physical-layer security in evolving optical networks. IEEE Commun. Mag. 54(8), 110\u2013117 (2016)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"61_CR2","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TIFS.2011.2141990","volume":"6","author":"MP Fok","year":"2011","unstructured":"Fok, M.P., et al.: Optical layer security in fiber-optic networks. IEEE Trans. Inf. Forensics Secur. 6(3), 725\u2013736 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Han, M., Kim, Y.: Unpredictable 16 bits LFSR-based true random number generator. In: SoC Design International Conference (ISOCC17( (2017)","DOI":"10.1109\/ISOCC.2017.8368897"},{"issue":"3","key":"61_CR4","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1109\/TIFS.2013.2246515","volume":"8","author":"X-B Liu","year":"2013","unstructured":"Liu, X.-B., et al.: A study on reconstruction of linear scrambler using dual words of channel encoder. IEEE Trans. Inf. Forensics Secur. 8(3), 542\u2013552 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"23","key":"61_CR5","doi-asserted-by":"publisher","first-page":"3813","DOI":"10.1109\/JLT.2013.2287905","volume":"31","author":"E Dimitriadou","year":"2013","unstructured":"Dimitriadou, E., Zoiros, K.E.: All-optical XOR gate using single quantum-dot SOA and optical filter. J. Lightwave Technol. 31(23), 3813\u20133821 (2013)","journal-title":"J. Lightwave Technol."},{"key":"61_CR6","unstructured":"Mobilen, E., Bernardo, R., Monte, L.R.: 100 Gbit\/s optical transport network 40\u00a0nm test chip design and prototyping. In: Microwave and Optoelectronics Conference (IMOC), 2017 SBMO\/IEEE MTT-S International. IEEE (2017)"},{"key":"61_CR7","unstructured":"Loprieno, G., Losio, G.: Timeslot encryption in an optical transport network. U.S. Patent No. 8,942,379, 27 January 2015\u200f"},{"key":"61_CR8","unstructured":"Liu, X.-B., et al.: Investigation on scrambler reconstruction with minimum a priori knowledge. In: Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE. IEEE (2011)\u200f"},{"issue":"4","key":"61_CR9","first-page":"1260","volume":"3","author":"MC Kumar","year":"2014","unstructured":"Kumar, M.C., Praveen Kumar, Y.G., Kurian, M.Z.: Design and implementation of logical scrambler architecture for OTN protocol. IJARCET 3(4), 1260\u20131262 (2014)","journal-title":"IJARCET"},{"key":"61_CR10","unstructured":"Engelmann, A., Jukan, A.: Computationally Secure Optical Transmission Systems with Optical Encryption at Line Rate. arXiv preprint \n                    arXiv:1610.01315\n                    \n                   (2016)\u200f"},{"key":"61_CR11","unstructured":"Engelmann, A., Jukan, A.: Computationally Secure Optical Transmission Systems with Optical Encryption at Line Rate. arXiv preprint \n                    arXiv:1610.01315\n                    \n                   (2016)"},{"key":"61_CR12","volume-title":"An Introduction to Information Theory and Entropy","author":"T Carter","year":"2007","unstructured":"Carter, T.: An Introduction to Information Theory and Entropy. Complex systems summer school, Santa Fe (2007)"},{"key":"61_CR13","unstructured":"Barlow, G.: A G. 709 Optical Transport Network Tutorial. Innocor Ltd. Capturado em (2003). \n                    http:\/\/www.innocor.com\/pdf_files\/g709_tutorial.pdf\n                    \n                  \u200f"}],"container-title":["Advances in Intelligent Systems and Computing","The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14118-9_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:56:12Z","timestamp":1558148172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14118-9_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"ISBN":["9783030141172","9783030141189"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14118-9_61","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,17]]},"assertion":[{"value":"17 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AMLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Machine Learning Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlta2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AMLTA19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}