No data available.
Please log in to see this content.
You have no subscription access to this content.
No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
8. D. C. Schleher, Electronic Warfare in the Information Age (Artech House, 1999).
10. S. Kristoffersen and Ø. Thingsrud, in Proceedings of EUSAR (2004), Vol. 2, p. 871.
13. C. Bennett and G. Brassard, in Proceedings of IEEE International Conference CSSP (1984), p. 175.
18. C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, in Advances in Cryptology: Proceedings of Crypto '82 (1982), p. 267.
29. F. Steinlechner, P. Trojek, M. Jofre, H. Weier, D. Perez, T. Jennewein, R. Ursin, J. Rarity, M. W. Mitchell, J. P. Torres, H. Weinfurter, and V. Pruneri, Opt. Express 20, 9640 (2012).
30. M. Malik, M. N. O'Sullivan, B. Rodenburg, M. Mirhosseini, J. Leach, M. P. J. Lavery, M. J. Padgett, and R. W. Boyd, Opt. Express 20, 13195 (2012).
Article metrics loading...
We have built an imaging system that uses a photon's position or time-of-flightinformation to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as “jamming,” this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.
Full text loading...
Most read this month