Sciweavers

80 search results - page 1 / 16
» User-Friendly Access Control for Public Network Ports
Sort
View
INFOCOM
1999
IEEE
13 years 8 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
IJSN
2006
76views more  IJSN 2006»
13 years 4 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
13 years 4 months ago
Privometer: Privacy protection in social networks
— The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information ...
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmag...
ESTIMEDIA
2007
Springer
13 years 10 months ago
Network Calculus Applied to Verification of Memory Access Performance in SoCs
SoCs for multimedia applications typically use only one port to off-chip DRAM for cost reasons. The sharing of interconnect and the off-chip DRAM port by several IP blocks makes t...
Tomas Henriksson, Pieter van der Wolf, Axel Jantsc...
IJIPT
2007
111views more  IJIPT 2007»
13 years 4 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss