—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
— In this paper, an Irregular Distributed Space-Time (Ir-DST) coding scheme is studied in the context of a twin-relay aided network in which the successive relaying protocol is e...
Lingkun Kong, Soon Xin Ng, Robert G. Maunder, Lajo...
— Mobile communication systems based on DS-CDMA suffer from multiple access interference (MAI), which limits the system capacity. Several techniques, such as beamforming with mul...
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...