Sciweavers

243 search results - page 4 / 49
» Location-Aware Authentication and Access Control
Sort
View
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
LCN
2007
IEEE
14 years 1 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
14 years 1 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
DCOSS
2006
Springer
13 years 11 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li