A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
This paper proposes an autonomous decentralized synchronization system for Inter-Vehicle Communication Network (IVCN). We have to consider the future of IVCN: “time variant” a...
Abstract. Starting from the Shannon channel capacity, we propose an IRUWB channel capacity based on the delay spread for multipath time variant channels. This IR-UWB channel capaci...
Aubin Lecointre, Daniela Dragomirescu, Robert Plan...
Abstract--Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as an attractive mutiplexing technique for the uplink segment of wireless syste...