Sciweavers

501 search results - page 53 / 101
» Access control and key management for mobile agents
Sort
View
ICAS
2005
IEEE
111views Robotics» more  ICAS 2005»
14 years 2 months ago
COOP - A cooperative caching service in MANETs
Data access applications in Mobile Ad Hoc Networks (MANETs) suffer from intermittent network connections and restricted power supplies. While most of the researches focus on Media...
Yu Du, Sandeep K. S. Gupta
HICSS
2002
IEEE
169views Biometrics» more  HICSS 2002»
14 years 1 months ago
Enabling Technology for Personalizing Mobile Services
A major trend in the current information society is personalization, which is considered a key business enabler for mobile services because the mobile device is a personal assista...
Marc M. Lankhorst, Herma Van Kranenburg, Alfons H....
IWCMC
2010
ACM
14 years 1 months ago
Dividing sensitive ranges based mobility prediction algorithm in wireless networks
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Yuliang Tang, Der-Jiunn Deng, Yannan Yuan, Chun-Ch...
ENTCS
2006
123views more  ENTCS 2006»
13 years 9 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...
WISA
2009
Springer
14 years 3 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...