Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Abstract— In many scenarios the commonly assumed symmetry in multiple relay channels is unrealistic. Therefore, this paper, through analytical and simulation efforts, investigate...
In this paper we investigate the channel capacity of intensity modulated direct detection (IM/DD) wireless optical communication systems for an AWGN channel with a limit on the ave...