Shichao Lv

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In wireless communication systems, spoofing attack significantly impact the information security, for this attack is not hard to launch with little effort. Although traditional cryptographic authentication can be utilized for node identification, it is not desirable in some low power requirements application scenarios such as Wireless Sensor Networks(More)
The construction of a dopant-activated photonic composite is of great technological importance for various applications, including smart lighting, optical amplification, laser, and optical detection. The bonding arrangement around the introduced dopants largely determines the properties, yet it remains a daunting challenge to manipulate the local state of(More)
Optical modulation is a crucial operation in photonics for network data processing with the aim to overcome information bottleneck in terms of speed, energy consumption, dispersion and cross-talking from conventional electronic interconnection approach. However, due to the weak interactions between photons, a facile physical approach is required to(More)
Microchannels have important scientific applications in many fields, because they enable precise control, manipulation, and analysis of fluid on a micrometer scale. Herein, we demonstrate an effective strategy for fabrication of microchannels, based on the space-selective phase separation in glass induced by a femtosecond laser. The proposed method shows(More)
In this paper, we propose a new security design, called as Zero Reconciliation Secret Key Extraction, for backscatter wireless systems, in which a reader needs to establish secret keys for multiple tags. Our design is able to eliminate the reconciliation process in conventional physical layer based key establishment, therefore improving the efficiency while(More)
  • 1