Sciweavers

NTMS
2008
IEEE
14 years 6 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
NTMS
2008
IEEE
14 years 6 months ago
Architecture for Consuming Long-Lived Mobile Web Services over Multiple Transport Protocols
—The concept of Mobile Web Services (Mob-WS) is catching pace within research communities due to rapid classification of mobile devices enabling pervasive environments. A Web Se...
Fahad Aijaz, Seyed Mohammad Adeli, Bernhard Walke
NTMS
2008
IEEE
14 years 6 months ago
An RF Channel Emulator-Based Testbed for Cooperative Transmission Using Wireless Sensor Devices
—In this paper, the issues and methods regarding setting up the testbed for measuring the performance of cooperative transmission is introduced. Also, some experiments on both th...
Jin-Woo Jung, Mary Ann Ingram
NTMS
2008
IEEE
14 years 6 months ago
Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems
—Peer-to-Peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual In...
Krzysztof Walkowiak
NTMS
2008
IEEE
14 years 6 months ago
Biometric Identification System Based on Electrocardiogram Data
Y. Gahi, M. Lamrani, Abdelhak Zoglat, Mouhcine Gue...
NTMS
2008
IEEE
14 years 6 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
NTMS
2008
IEEE
14 years 6 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
NTMS
2008
IEEE
14 years 6 months ago
An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment Monitoring
—In wireless sensor networks (WSNs), the frequency of sensing and data gathering depends on application requirements and surrounding conditions. In this paper, we propose a data ...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...