In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some a...
— In this paper, we propose a contention based uplink Medium Access Control (MAC) protocol design for Wireless Local Area Networks (WLANs) with Spatial Division Multiple Access (...
Mirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests serv...