968 resultados para Linux security module


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, a novel light source of strained InGaAsP/InGaAsP MQW EAM monolithically integrated with DFB laser is fabricated by ultra-low-pressure (22 x 10(2) Pa) selective area growth ( SAG) MOCVD technique. Superior device performances have been obtained, sue h as low threshold current of 19 mA, output light power of about 7 mW, and over 16 dB extinction ratio at 5 V applied voltage when coupled into a single mode fiber. Over 10 GHz 3 dB bandwidth in EAM part is developed with a driving voltage of 3 V. After the chip is packaged into a 7-pin butterfly compact module, 10-Gb/s NRZ transmission experiments are successfully performed in standard fiber. A clearly-open eye diagram is achieved in the module output with over 8.3 dB dynamic extinction ratio. Power penalty less than 1.5 dB has been obtained after transmission through 53.3 km of standard fiber, which demonstrates that high-speed, low chirp EAM/DFB integrated light source can be obtained by ultra-low-pressure (22 x 102 Pa) SAG method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a new generation 980 nm submarine pump module that consists of a hermitically sealed 8-pin ceramic MiniDIL package without thermo-electric cooler.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A V-shaped solar cell module consists of two tilted mono-crystalline cells [J. Li, China Patent No. 200410007708.6 (March, 2004)]. The angle included between the two tilted cells is 90 degrees. The two cells were fabricated by using polished silicon wafers. The scheme of both-side polished wafers has been proposed to reduce optical loss. Compared to solar cells in a planar way, the V-shaped structure enhances external quantum efficiency and leads to an increase of 15% in generation photocurrent density. The following three kinds of trapped photons are suggested to contribute to the increase: (1) infrared photons converted from visible photons due to a transformation mechanism, (2) photons reflected from top contact metal, and (3) a residual reflection which can not be eliminated by an antireflection coating.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the design process and performance of the optimized parallel optical transmission module. Based on 1x12 VCSEL (Vertical Cavity Surface Emitting Laser) array, we designed and fabricated the high speed parallel optical modules. Our parallel optical module contains a 1x12 VCSEL array, a 12 channel CMOS laser driver circuit, a high speed PCB (Printed Circuit Board), a MT fiber connector and a packaging housing. The L-I-V characteristics of the 850nm VCSEL was measured at the operating current 8mA, 3dB frequency bandwidth more than 3GHz and the optical output 1mW. The transmission rate of all 12 channels is 30Gbit/s, with a single channel 2.5Gbit/s. By adopting the integration of the 1x12 VCSEL array and the driver array, we make a high speed PCB (Printed Circuit Board) to provide the optoelectronic chip with the operating voltage and high speed signals current. The LVDS (Low-Voltage Differential Signals) was set as the input signal to achieve better high frequency performance. The active coupling was adopted with a MT connector (8 degrees slant fiber array). We used the Small Form Factor Pluggable (SFP) packaging. With the edge connector, the module could be inserted into the system dispense with bonding process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

由于Linux良好的开放性和USB总线极佳的通用性 ,USB设备在Linux操作系统中得到了广泛的应用。文中首先介绍Linux驱动程序的架构 ,然后介绍USB设备 ,重点说明USB驱动程序的实现

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador: