Sciweavers

726 search results - page 56 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
VTC
2007
IEEE
159views Communications» more  VTC 2007»
14 years 1 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
MOBICOM
2004
ACM
14 years 1 months ago
Exploiting medium access diversity in rate adaptive wireless LANs
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
ACSAC
2010
IEEE
13 years 5 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
VTC
2007
IEEE
184views Communications» more  VTC 2007»
14 years 1 months ago
Adaptive Spread Spectrum Multicarrier Multiple-Access for UWB Systems
—Ultra-wideband (UWB) has emerged as an exciting technology for short range, high data rate wireless personal area networks (WPAN) applications. The multiband orthogonal frequenc...
Antoine Stephan, Jean-Yves Baudais, Jean-Fran&cced...