Sciweavers

1517 search results - page 71 / 304
» Time and Location Based Services with Access Control
Sort
View
IFIPTM
2010
139views Management» more  IFIPTM 2010»
13 years 7 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
TRIDENTCOM
2005
IEEE
14 years 2 months ago
An Open Access Wideband Multi-Antenna Wireless Testbed with Remote Control Capability
This paper introduces an open access wideband multiantenna wireless testbed. The testbed is configured as a four transmit antenna by four receive antenna system based on software...
Weijun Zhu, David W. Browne, Michael P. Fitz
COMPSAC
2004
IEEE
14 years 16 days ago
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. T...
Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
ICC
2007
IEEE
14 years 3 months ago
Queueing Performance of IEEE 802.16 Random Access Protocol with Bulk Transmissions
— In this paper, we consider the queueing performance of a subscriber station for IEEE802.16e random access protocol with bulk transmissions which is allowed with an ARQ protocol...
Hyong-Woo Lee, Jun-Bae Seo
IASTEDSE
2004
13 years 10 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis