Sciweavers

115 search results - page 7 / 23
» Hidden access control policies with hidden credentials
Sort
View
WOWMOM
2005
ACM
112views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks
IEEE 802.11 Medium Access Control (MAC) called Distributed Coordination Function (DCF) provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) hands...
Ilenia Tinnirello, Sunghyun Choi, Youngsoo Kim
ICDCS
1996
IEEE
15 years 1 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
CCS
2009
ACM
15 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
NETWORKING
2004
14 years 10 months ago
Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals
: IEEE 802.11 exhibits both short-term and long-term unfairness [15]. The short-term fairness automatically gives rise to long-term fairness, but not vice versa [11]. When we thoro...
Zhifei Li, Sukumar Nandi, Anil K. Gupta
GLOBECOM
2010
IEEE
14 years 7 months ago
Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Exist...
Piergiuseppe Di Marco, Pan Gun Park, Carlo Fischio...