2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2022
DOI: 10.1109/compsac54236.2022.00288
|View full text |Cite
|
Sign up to set email alerts
|

Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Specifically, it will be necessary to design a secure method for key distribution from xKD equipment to the optical transponder and a secure method for equipment authentication between xKD equipment and the optical transponder. For details on these studies, the reader is asked to consult a previously published paper [5].…”
Section: Countermeasures Against Attackers In a Zero Trust Networkmentioning
confidence: 99%
“…Specifically, it will be necessary to design a secure method for key distribution from xKD equipment to the optical transponder and a secure method for equipment authentication between xKD equipment and the optical transponder. For details on these studies, the reader is asked to consult a previously published paper [5].…”
Section: Countermeasures Against Attackers In a Zero Trust Networkmentioning
confidence: 99%