Sciweavers

1000 search results - page 192 / 200
» Application Access Control at Network Level
Sort
View
MOBICOM
2010
ACM
13 years 8 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 8 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
ECIS
2003
13 years 10 months ago
From traditional to virtual organisation: implications for work unit boundaries
Boundary and virtual organisation theory were used to study the implications of organisation level virtualisation for work units. A single case study in a geographically dispersed...
Christopher J. Hemingway, Karin Breu
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
14 years 26 days ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ICUIMC
2011
ACM
13 years 18 hour ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...