Sciweavers

4529 search results - page 53 / 906
» Position Based Cryptography
Sort
View
ACSAC
1999
IEEE
15 years 4 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
EUSAI
2007
Springer
15 years 6 months ago
How Computer Vision Can Help in Outdoor Positioning
Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positio...
Ulrich Steinhoff, Dusan Omercevic, Roland Perko, B...
PERCOM
2008
ACM
15 years 11 months ago
Location Fingerprint Analyses Toward Efficient Indoor Positioning
Abstract--Analytical models to evaluate and predict "precision" performance of indoor positioning systems based on location fingerprinting are lacking. Such models can be...
Nattapong Swangmuang, Prashant Krishnamurthy
WCE
2007
15 years 1 months ago
System Design and Networking Protocols for Wireless Positioning
Abstract—The recent boom in wireless communications has led to a wide range of new applications. Wireless positioning is an emerging technology which can provide accurate locatio...
Bo Peng, Andrew H. Kemp, Washington Ochieng
SIGMOD
2000
ACM
120views Database» more  SIGMOD 2000»
15 years 4 months ago
Indexing the Positions of Continuously Moving Objects
The coming years will witness dramatic advances in wireless communications as well as positioning technologies. As a result, tracking the changing positions of objects capable of ...
Simonas Saltenis, Christian S. Jensen, Scott T. Le...