Sciweavers

828 search results - page 25 / 166
» Access Control in Location-Based Services
Sort
View
CN
2007
172views more  CN 2007»
13 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
MDM
2007
Springer
14 years 3 months ago
Privacy (Regimes) Do Not Threaten Location Technology Development
Location technology allows for the tracking and tracing of individuals. Users may increasingly be concerned about the abilities of new technology to keep an eye on ones’ private...
Bastiaan van Loenen, Jaap Zevenbergen
APNOMS
2007
Springer
14 years 4 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
NGC
2001
Springer
116views Communications» more  NGC 2001»
14 years 2 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou
ITCC
2005
IEEE
14 years 3 months ago
An Aspect-Oriented Approach to Mobile Agent Access Control
This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
Dianxiang Xu, Vivek Goel