Sciweavers

1462 search results - page 63 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
BMVC
1998
15 years 3 months ago
Vision Based Person Tracking with a Mobile Robot
We address the problem of detecting and tracking people with a mobile robot. The need for following a person with a mobile robot arises in many different service robotic applicati...
Christian Schlegel, Jörg Illmann, Heiko Jaber...
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 3 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WISEC
2009
ACM
15 years 8 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
GLOBECOM
2008
IEEE
15 years 8 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
WETICE
1997
IEEE
15 years 6 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...