Abstract In this survey, the currently available ultrawideband-based non-line-of-sight (NLOS) identification and error mitigation methods are presented. They are classified into se...
Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
This paper presents a fast localisation algorithm for autonomous mobile agents in dynamic environments based on the definition of a new very small sized landmark type. These landm...
Cristina Urdiales, Antonio Bandera, R. Ron, Franci...
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...