Sciweavers

1150 search results - page 14 / 230
» Beacon Based Authentication
Sort
View
JCS
2011
126views more  JCS 2011»
13 years 2 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
ROBOCUP
2005
Springer
85views Robotics» more  ROBOCUP 2005»
14 years 29 days ago
Particle-Filter-Based Self-localization Using Landmarks and Directed Lines
The paper presents the self-localization approach used by the World Champion in the Sony Four-Legged Robot League 2004. The method is based on a particle filter that makes use of ...
Thomas Röfer, Tim Laue, Dirk Thomas
LOCA
2005
Springer
14 years 29 days ago
Improving the Accuracy of Ultrasound-Based Localisation Systems
Abstract. We present an improvement to ultrasound–based indoor location systems like Cricket [1]. By encoding and modulating the ultrasound pulses, we are able to achieve greater...
Hubert Piontek, Matthias Seyffer, Jörg Kaiser
ICIP
2007
IEEE
14 years 9 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod
PIMRC
2008
IEEE
14 years 1 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa