Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
We evaluate the security performance of the recently proposed "stealth" approach to covert communications over a public fiber-optical network. We present quantitative security analysis to assess the vulnerability of such systems against different attacks executed by an eavesdropper. We demonstrate the security advantage of the system by examining the BER/SNR performance as a function of the fidelity of the decoder used by an eavesdropper. Effective key length is constructed as a security metric to gauge the level of confidentiality implicit in the secure transmission.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1364/oe.15.000289 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!