Sciweavers

726 search results - page 81 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
MOBICOM
2010
ACM
13 years 8 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
ICCSA
2009
Springer
14 years 2 months ago
VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems
Supporting multimedia traffic is one of the major challenges for the next generation of wireless personal area networks (WPANs). Especially, the IEEE 802.15.4 WPAN standards specif...
Junwoo Jung, Hoki Baek, Jaesung Lim
AINA
2005
IEEE
13 years 9 months ago
Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet
— Bluetooth is a short-range TDD (Time Division Duplex) wireless network that supports both circuit- and packetoriented applications. A piconet is composed of a device configure...
Li-Hsing Yen, Chi-Hung Liao
CERA
2004
89views more  CERA 2004»
13 years 7 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
EJWCN
2010
118views more  EJWCN 2010»
13 years 2 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang