Sciweavers

334 search results - page 2 / 67
» Controlled Delegation Protocol in Mobile RFID Networks
Sort
View
ICDCSW
2003
IEEE
13 years 10 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
SIGCOMM
2009
ACM
13 years 11 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
SAINT
2007
IEEE
13 years 11 months ago
A HIP Based Network Mobility Protocol
– The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and ch...
Szabolcs Nováczki, László Bok...
ITIIS
2010
154views more  ITIIS 2010»
13 years 3 days ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
VTC
2007
IEEE
13 years 11 months ago
Mobility Management in Ambient Networks
– Allowing a user to remain connected to the network whilst on the move is becoming a common requirement for any new communication system. The EU project Ambient Networks, theref...
Ramon Aguero Calvo, Abigail Surtees, Jochen Eisl, ...