Sciweavers

243 search results - page 4 / 49
» Location-Aware Authentication and Access Control
Sort
View
ICCSA
2010
Springer
15 years 4 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
LCN
2007
IEEE
15 years 3 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
15 years 3 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
62
Voted
TNC
2004
118views Education» more  TNC 2004»
14 years 10 months ago
Authentication and Access Control in Sympa Mailing List Software
Olivier Salaün, Serge Aumont
DCOSS
2006
Springer
15 years 1 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li