Roadmap on optical security
- Autores
- Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto Daniel; Barrera Ramírez, John Fredy; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W.H.; Mosk, Allard P.; Markman, Adam
- Año de publicación
- 2016
- Idioma
- inglés
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Fil: Javidi, Bahram. University of Connecticut; Estados Unidos
Fil: Carnicer, Artur. Universidad de Barcelona; España
Fil: Yamaguchi, Masahiro. Tokyo Institute Of Technology; Japón
Fil: Nomura, Takanori. Wakayama University; Japón
Fil: Pérez-Cabré, Elisabet. Universidad Politécnica de Catalunya; España
Fil: Millán, María S.. Universidad Politécnica de Catalunya; España
Fil: Nishchal, Naveen K.. Indian Institute Of Technology Patna; India
Fil: Torroba, Roberto Daniel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - La Plata. Centro de Investigaciones Ópticas. Provincia de Buenos Aires. Gobernación. Comisión de Investigaciones Científicas. Centro de Investigaciones Ópticas. Universidad Nacional de La Plata. Centro de Investigaciones Ópticas; Argentina
Fil: Barrera Ramírez, John Fredy. Universidad de Antioquia; Colombia
Fil: He, Wenqi. Shenzhen University; China
Fil: Peng, Xiang. Shenzhen University; China
Fil: Stern, Adrian. Ben Gurion University of The Negev; Israel
Fil: Rivenson, Yair. University of California at Los Angeles; Estados Unidos
Fil: Alfalou, A.. Institut Superieur D'electronique Et Du Numerique; Francia
Fil: Brosseau, C.. Universite de Bretagne Occidentale; Francia
Fil: Guo, Changliang. University College Dublin; Irlanda
Fil: Sheridan, John T.. University College Dublin; Irlanda
Fil: Situ, Guohai. Chinese Academy of Sciences; República de China
Fil: Naruse, Makoto. Japan National Institute Of Information And Communications Technology; Japón
Fil: Matsumoto, Tsutomu. Yokohama National University; Japón
Fil: Juvells, Ignasi. Universidad de Barcelona; España
Fil: Tajahuerce, Enrique. Universitat Jaume I; España
Fil: Lancis, Jesús. Universitat Jaume I; España
Fil: Chen, Wen. Hong Kong Polytechnic University; China
Fil: Chen, Xudong. National University Of Singapore; Singapur
Fil: Pinkse, Pepijn W.H.. Mesa Institute For Nanotechnology;
Fil: Mosk, Allard P.. University of Twente; Países Bajos
Fil: Markman, Adam. University of Connecticut; Estados Unidos - Materia
-
ENCRYPTION
SPECKLE
SECURITY - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Consejo Nacional de Investigaciones Científicas y Técnicas
- OAI Identificador
- oai:ri.conicet.gov.ar:11336/54408
Ver los metadatos del registro completo
id |
CONICETDig_b3772966befdb4a0755f5381d9ef9c24 |
---|---|
oai_identifier_str |
oai:ri.conicet.gov.ar:11336/54408 |
network_acronym_str |
CONICETDig |
repository_id_str |
3498 |
network_name_str |
CONICET Digital (CONICET) |
spelling |
Roadmap on optical securityJavidi, BahramCarnicer, ArturYamaguchi, MasahiroNomura, TakanoriPérez-Cabré, ElisabetMillán, María S.Nishchal, Naveen K.Torroba, Roberto DanielBarrera Ramírez, John FredyHe, WenqiPeng, XiangStern, AdrianRivenson, YairAlfalou, A.Brosseau, C.Guo, ChangliangSheridan, John T.Situ, GuohaiNaruse, MakotoMatsumoto, TsutomuJuvells, IgnasiTajahuerce, EnriqueLancis, JesúsChen, WenChen, XudongPinkse, Pepijn W.H.Mosk, Allard P.Markman, AdamENCRYPTIONSPECKLESECURITYhttps://purl.org/becyt/ford/1.3https://purl.org/becyt/ford/1Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Fil: Javidi, Bahram. University of Connecticut; Estados UnidosFil: Carnicer, Artur. Universidad de Barcelona; EspañaFil: Yamaguchi, Masahiro. Tokyo Institute Of Technology; JapónFil: Nomura, Takanori. Wakayama University; JapónFil: Pérez-Cabré, Elisabet. Universidad Politécnica de Catalunya; EspañaFil: Millán, María S.. Universidad Politécnica de Catalunya; EspañaFil: Nishchal, Naveen K.. Indian Institute Of Technology Patna; IndiaFil: Torroba, Roberto Daniel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - La Plata. Centro de Investigaciones Ópticas. Provincia de Buenos Aires. Gobernación. Comisión de Investigaciones Científicas. Centro de Investigaciones Ópticas. Universidad Nacional de La Plata. Centro de Investigaciones Ópticas; ArgentinaFil: Barrera Ramírez, John Fredy. Universidad de Antioquia; ColombiaFil: He, Wenqi. Shenzhen University; ChinaFil: Peng, Xiang. Shenzhen University; ChinaFil: Stern, Adrian. Ben Gurion University of The Negev; IsraelFil: Rivenson, Yair. University of California at Los Angeles; Estados UnidosFil: Alfalou, A.. Institut Superieur D'electronique Et Du Numerique; FranciaFil: Brosseau, C.. Universite de Bretagne Occidentale; FranciaFil: Guo, Changliang. University College Dublin; IrlandaFil: Sheridan, John T.. University College Dublin; IrlandaFil: Situ, Guohai. Chinese Academy of Sciences; República de ChinaFil: Naruse, Makoto. Japan National Institute Of Information And Communications Technology; JapónFil: Matsumoto, Tsutomu. Yokohama National University; JapónFil: Juvells, Ignasi. Universidad de Barcelona; EspañaFil: Tajahuerce, Enrique. Universitat Jaume I; EspañaFil: Lancis, Jesús. Universitat Jaume I; EspañaFil: Chen, Wen. Hong Kong Polytechnic University; ChinaFil: Chen, Xudong. National University Of Singapore; SingapurFil: Pinkse, Pepijn W.H.. Mesa Institute For Nanotechnology;Fil: Mosk, Allard P.. University of Twente; Países BajosFil: Markman, Adam. University of Connecticut; Estados UnidosInstitute of Physics Publishing2016-08info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/54408Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; et al.; Roadmap on optical security; Institute of Physics Publishing; Journal of Optics (United Kingdom); 18; 8; 8-2016; 1-392040-8986CONICET DigitalCONICETenginfo:eu-repo/semantics/altIdentifier/doi/10.1088/2040-8978/18/8/083001info:eu-repo/semantics/altIdentifier/url/http://iopscience.iop.org/article/10.1088/2040-8978/18/8/083001/metainfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-10-15T15:12:09Zoai:ri.conicet.gov.ar:11336/54408instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-10-15 15:12:09.799CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse |
dc.title.none.fl_str_mv |
Roadmap on optical security |
title |
Roadmap on optical security |
spellingShingle |
Roadmap on optical security Javidi, Bahram ENCRYPTION SPECKLE SECURITY |
title_short |
Roadmap on optical security |
title_full |
Roadmap on optical security |
title_fullStr |
Roadmap on optical security |
title_full_unstemmed |
Roadmap on optical security |
title_sort |
Roadmap on optical security |
dc.creator.none.fl_str_mv |
Javidi, Bahram Carnicer, Artur Yamaguchi, Masahiro Nomura, Takanori Pérez-Cabré, Elisabet Millán, María S. Nishchal, Naveen K. Torroba, Roberto Daniel Barrera Ramírez, John Fredy He, Wenqi Peng, Xiang Stern, Adrian Rivenson, Yair Alfalou, A. Brosseau, C. Guo, Changliang Sheridan, John T. Situ, Guohai Naruse, Makoto Matsumoto, Tsutomu Juvells, Ignasi Tajahuerce, Enrique Lancis, Jesús Chen, Wen Chen, Xudong Pinkse, Pepijn W.H. Mosk, Allard P. Markman, Adam |
author |
Javidi, Bahram |
author_facet |
Javidi, Bahram Carnicer, Artur Yamaguchi, Masahiro Nomura, Takanori Pérez-Cabré, Elisabet Millán, María S. Nishchal, Naveen K. Torroba, Roberto Daniel Barrera Ramírez, John Fredy He, Wenqi Peng, Xiang Stern, Adrian Rivenson, Yair Alfalou, A. Brosseau, C. Guo, Changliang Sheridan, John T. Situ, Guohai Naruse, Makoto Matsumoto, Tsutomu Juvells, Ignasi Tajahuerce, Enrique Lancis, Jesús Chen, Wen Chen, Xudong Pinkse, Pepijn W.H. Mosk, Allard P. Markman, Adam |
author_role |
author |
author2 |
Carnicer, Artur Yamaguchi, Masahiro Nomura, Takanori Pérez-Cabré, Elisabet Millán, María S. Nishchal, Naveen K. Torroba, Roberto Daniel Barrera Ramírez, John Fredy He, Wenqi Peng, Xiang Stern, Adrian Rivenson, Yair Alfalou, A. Brosseau, C. Guo, Changliang Sheridan, John T. Situ, Guohai Naruse, Makoto Matsumoto, Tsutomu Juvells, Ignasi Tajahuerce, Enrique Lancis, Jesús Chen, Wen Chen, Xudong Pinkse, Pepijn W.H. Mosk, Allard P. Markman, Adam |
author2_role |
author author author author author author author author author author author author author author author author author author author author author author author author author author author |
dc.subject.none.fl_str_mv |
ENCRYPTION SPECKLE SECURITY |
topic |
ENCRYPTION SPECKLE SECURITY |
purl_subject.fl_str_mv |
https://purl.org/becyt/ford/1.3 https://purl.org/becyt/ford/1 |
dc.description.none.fl_txt_mv |
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication. Fil: Javidi, Bahram. University of Connecticut; Estados Unidos Fil: Carnicer, Artur. Universidad de Barcelona; España Fil: Yamaguchi, Masahiro. Tokyo Institute Of Technology; Japón Fil: Nomura, Takanori. Wakayama University; Japón Fil: Pérez-Cabré, Elisabet. Universidad Politécnica de Catalunya; España Fil: Millán, María S.. Universidad Politécnica de Catalunya; España Fil: Nishchal, Naveen K.. Indian Institute Of Technology Patna; India Fil: Torroba, Roberto Daniel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - La Plata. Centro de Investigaciones Ópticas. Provincia de Buenos Aires. Gobernación. Comisión de Investigaciones Científicas. Centro de Investigaciones Ópticas. Universidad Nacional de La Plata. Centro de Investigaciones Ópticas; Argentina Fil: Barrera Ramírez, John Fredy. Universidad de Antioquia; Colombia Fil: He, Wenqi. Shenzhen University; China Fil: Peng, Xiang. Shenzhen University; China Fil: Stern, Adrian. Ben Gurion University of The Negev; Israel Fil: Rivenson, Yair. University of California at Los Angeles; Estados Unidos Fil: Alfalou, A.. Institut Superieur D'electronique Et Du Numerique; Francia Fil: Brosseau, C.. Universite de Bretagne Occidentale; Francia Fil: Guo, Changliang. University College Dublin; Irlanda Fil: Sheridan, John T.. University College Dublin; Irlanda Fil: Situ, Guohai. Chinese Academy of Sciences; República de China Fil: Naruse, Makoto. Japan National Institute Of Information And Communications Technology; Japón Fil: Matsumoto, Tsutomu. Yokohama National University; Japón Fil: Juvells, Ignasi. Universidad de Barcelona; España Fil: Tajahuerce, Enrique. Universitat Jaume I; España Fil: Lancis, Jesús. Universitat Jaume I; España Fil: Chen, Wen. Hong Kong Polytechnic University; China Fil: Chen, Xudong. National University Of Singapore; Singapur Fil: Pinkse, Pepijn W.H.. Mesa Institute For Nanotechnology; Fil: Mosk, Allard P.. University of Twente; Países Bajos Fil: Markman, Adam. University of Connecticut; Estados Unidos |
description |
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication. |
publishDate |
2016 |
dc.date.none.fl_str_mv |
2016-08 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://hdl.handle.net/11336/54408 Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; et al.; Roadmap on optical security; Institute of Physics Publishing; Journal of Optics (United Kingdom); 18; 8; 8-2016; 1-39 2040-8986 CONICET Digital CONICET |
url |
http://hdl.handle.net/11336/54408 |
identifier_str_mv |
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; et al.; Roadmap on optical security; Institute of Physics Publishing; Journal of Optics (United Kingdom); 18; 8; 8-2016; 1-39 2040-8986 CONICET Digital CONICET |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/doi/10.1088/2040-8978/18/8/083001 info:eu-repo/semantics/altIdentifier/url/http://iopscience.iop.org/article/10.1088/2040-8978/18/8/083001/meta |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
dc.format.none.fl_str_mv |
application/pdf application/pdf |
dc.publisher.none.fl_str_mv |
Institute of Physics Publishing |
publisher.none.fl_str_mv |
Institute of Physics Publishing |
dc.source.none.fl_str_mv |
reponame:CONICET Digital (CONICET) instname:Consejo Nacional de Investigaciones Científicas y Técnicas |
reponame_str |
CONICET Digital (CONICET) |
collection |
CONICET Digital (CONICET) |
instname_str |
Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.name.fl_str_mv |
CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.mail.fl_str_mv |
dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar |
_version_ |
1846083269731287040 |
score |
13.22299 |