Sciweavers

1150 search results - page 8 / 230
» Beacon Based Authentication
Sort
View
ADHOCNETS
2010
Springer
13 years 4 months ago
DCLA: A Duty-Cycle Learning Algorithm for IEEE 802.15.4 Beacon-Enabled WSNs
The current specification for IEEE 802.15.4 beacon-enabled networks does not define how active and sleep schedules should be configured in order to achieve the optimal network perf...
Rodolfo de Paz Alberola, Dirk Pesch
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 7 months ago
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
: Problem statement: Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. Approach: In this research we proposed a...
Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al...
ICIAR
2010
Springer
14 years 7 days ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
IMC
2003
ACM
14 years 22 days ago
Constructing internet coordinate system based on delay measurement
In this paper, we consider the problem of how to represent the locations of Internet hosts in a Cartesian coordinate system to facilitate estimate of the network distance between ...
Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi
HUC
2007
Springer
14 years 1 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell