Lightweight cryptography methods
Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...
10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking
Journal Article
Asif, R., & Haithem, M. (2017)
10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking. Optics Communications, 391, 106-110. https://doi.org/10.1016/j.optcom.2017.01.022
Generalized few-mode-fiber (FMF) transmission uses N coherent receivers for mode detection, where N scales with the number of fiber modes. Multiple coherent receivers increase...
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...