Sciweavers

1150 search results - page 1 / 230
» Beacon Based Authentication
Sort
View
ESORICS
1994
Springer
13 years 9 months ago
Beacon Based Authentication
Azad Jiwa, Jennifer Seberry, Yuliang Zheng
CSIE
2009
IEEE
14 years 2 days ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
AINA
2006
IEEE
13 years 11 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
SUTC
2008
IEEE
13 years 11 months ago
Two Practical Considerations of Beacon Deployment for Ultrasound-Based Indoor Localization Systems
In this paper, two practical considerations of beacon deployment for ultrasound-based indoor localization systems are presented. In an indoor environment, beacons are deployed inc...
Chun-Chieh Hsiao, Polly Huang
INTELLCOMM
2004
Springer
13 years 10 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...