{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:18:23Z","timestamp":1761621503053,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030380847"},{"type":"electronic","value":"9783030380854"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38085-4_29","type":"book-chapter","created":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T20:02:20Z","timestamp":1581796940000},"page":"336-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Network Coding for Security Against Eavesdropping Attacks in Elastic Optical Networks"],"prefix":"10.1007","author":[{"given":"Giannis","family":"Savva","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Manousakis","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Ellinas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,16]]},"reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"s12","DOI":"10.1109\/MCOM.2012.6146481","volume":"50","author":"O Gerstel","year":"2012","unstructured":"Gerstel, O., Jinno, M., Lord, A., Yoo, S.J.B.: Elastic optical networking: a new dawn for the optical layer? IEEE Commun. Mag. 50(2), s12\u2013s20 (2012). https:\/\/doi.org\/10.1109\/MCOM.2012.6146481","journal-title":"IEEE Commun. Mag."},{"key":"29_CR2","doi-asserted-by":"publisher","unstructured":"Christodoulopoulos, K., Tomkos, I., Varvarigos, E.A.: Routing and spectrum allocation in OFDM-based optical networks with elastic bandwidth allocation. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1\u20136 (2010). https:\/\/doi.org\/10.1109\/GLOCOM.2010.5684008","DOI":"10.1109\/GLOCOM.2010.5684008"},{"issue":"3","key":"29_CR3","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TIFS.2011.2141990","volume":"6","author":"MP Fok","year":"2011","unstructured":"Fok, M.P., Wang, Z., Deng, Y., Prucnal, P.R.: Optical layer security in fiber-optic networks. IEEE Trans. Inf. Forensics Secur. 6(3), 725\u2013736 (2011). https:\/\/doi.org\/10.1109\/TIFS.2011.2141990","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"29_CR4","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2016.7537185","volume":"54","author":"N Skorin-Kapov","year":"2016","unstructured":"Skorin-Kapov, N., Furdek, M., Zsigmond, S., Wosinska, L.: Physical-layer security in evolving optical networks. IEEE Commun. Mag. 54(8), 110\u2013117 (2016). https:\/\/doi.org\/10.1109\/MCOM.2016.7537185","journal-title":"IEEE Commun. Mag."},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.osn.2015.03.005","volume":"19","author":"K Manousakis","year":"2016","unstructured":"Manousakis, K., Ellinas, G.: Attack-aware planning of transparent optical networks. Opt. Switch. Netw. 19, 97\u2013109 (2016). https:\/\/doi.org\/10.1016\/j.osn.2015.03.005. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1573427715000302. Advances in Availability and Survivability in Optical Networks","journal-title":"Opt. Switch. Netw."},{"issue":"21","key":"29_CR6","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/JLT.2011.2166248","volume":"29","author":"K Kitayama","year":"2011","unstructured":"Kitayama, K., et al.: Security in photonic networks: threats and security enhancement. J. Lightwave Technol. 29(21), 3210\u20133222 (2011). https:\/\/doi.org\/10.1109\/JLT.2011.2166248","journal-title":"J. Lightwave Technol."},{"key":"29_CR7","doi-asserted-by":"publisher","unstructured":"Agarwal, A., Charikar, M.: On the advantage of network coding for improving network throughput. In: Information Theory Workshop, pp. 247\u2013249 (2004). https:\/\/doi.org\/10.1109\/ITW.2004.1405308","DOI":"10.1109\/ITW.2004.1405308"},{"key":"29_CR8","doi-asserted-by":"publisher","unstructured":"Ramirez, W., Masip-Bruin, X., Yannuzzi, M., Montero, D., Martinez, A., Lopez, V.: Network coding-based protection scheme for elastic optical networks. In: 2014 10th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 1\u20138 (2014). https:\/\/doi.org\/10.1109\/DRCN.2014.6816136","DOI":"10.1109\/DRCN.2014.6816136"},{"key":"29_CR9","doi-asserted-by":"publisher","unstructured":"Engelmann, A., Jukan, A.: Balancing the demands of reliability and security with linear network coding in optical networks. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20137 (2016). https:\/\/doi.org\/10.1109\/ICC.2016.7511590","DOI":"10.1109\/ICC.2016.7511590"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.yofte.2017.10.004","volume":"40","author":"W Bai","year":"2018","unstructured":"Bai, W., et al.: Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks. Opt. Fiber Technol. 40, 18\u201327 (2018). https:\/\/doi.org\/10.1016\/j.yofte.2017.10.004. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1068520017303085","journal-title":"Opt. Fiber Technol."},{"key":"29_CR11","doi-asserted-by":"publisher","unstructured":"Singh, S.K., Bziuk, W., Jukan, A.: Balancing data security and blocking performance with spectrum randomization in optical networks. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137 (2016). https:\/\/doi.org\/10.1109\/GLOCOM.2016.7841622","DOI":"10.1109\/GLOCOM.2016.7841622"},{"key":"29_CR12","doi-asserted-by":"publisher","unstructured":"Savva, G., Manousakis, K., Ellinas, G.: Eavesdropping-aware routing and spectrum allocation in eons using spread spectrum techniques. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/GLOCOM.2018.8647253","DOI":"10.1109\/GLOCOM.2018.8647253"},{"key":"29_CR13","doi-asserted-by":"publisher","unstructured":"Savva, G., Manousakis, K., Ellinas, G.: Spread spectrum over OFDM for enhanced security in elastic optical networks. In: 2018 Photonics in Switching and Computing (PSC), pp. 1\u20133 (2018). https:\/\/doi.org\/10.1109\/PS.2018.8751442","DOI":"10.1109\/PS.2018.8751442"},{"issue":"5","key":"29_CR14","doi-asserted-by":"publisher","first-page":"S19","DOI":"10.1109\/MCOM.2005.1453421","volume":"43","author":"M Zhang","year":"2005","unstructured":"Zhang, M., Wang, L., Ye, P.: All optical XOR logic gates: technologies and experiment demonstrations. IEEE Commun. Mag. 43(5), S19\u2013S24 (2005). https:\/\/doi.org\/10.1109\/MCOM.2005.1453421","journal-title":"IEEE Commun. Mag."},{"issue":"7","key":"29_CR15","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1049\/el.2013.0010","volume":"49","author":"D Kong","year":"2013","unstructured":"Kong, D., et al.: All-optical XOR gates for QPSK signal based optical networks. Electron. Lett. 49(7), 486\u2013488 (2013). https:\/\/doi.org\/10.1049\/el.2013.0010","journal-title":"Electron. Lett."},{"key":"29_CR16","doi-asserted-by":"publisher","unstructured":"Savva, G., Ellinas, G., Shariati, B., Tomkos, I.: Physical layer-aware routing, spectrum, and core allocation in spectrally-spatially flexible optical networks with multicore fibers. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ICC.2018.8422782","DOI":"10.1109\/ICC.2018.8422782"},{"key":"29_CR17","doi-asserted-by":"publisher","unstructured":"Savva, G., Manousakis, K., Shariati, B., Tomkos, I., Ellinas, G.: Connection provisioning in spectrally-spatially flexible optical networks with physical layer considerations. In: 2018 20th International Conference on Transparent Optical Networks (ICTON), pp. 1\u20134 (2018). https:\/\/doi.org\/10.1109\/ICTON.2018.8473872","DOI":"10.1109\/ICTON.2018.8473872"}],"container-title":["Lecture Notes in Computer Science","Optical Network Design and Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38085-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T01:08:18Z","timestamp":1707959298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-38085-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030380847","9783030380854"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38085-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"16 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ONDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International IFIP Conference on Optical Network Design and Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ondm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ondm2019.com\/home\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}