Sciweavers

1517 search results - page 71 / 304
» Time and Location Based Services with Access Control
Sort
View
IFIPTM
2010
139views Management» more  IFIPTM 2010»
15 years 14 hour ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
TRIDENTCOM
2005
IEEE
15 years 7 months ago
An Open Access Wideband Multi-Antenna Wireless Testbed with Remote Control Capability
This paper introduces an open access wideband multiantenna wireless testbed. The testbed is configured as a four transmit antenna by four receive antenna system based on software...
Weijun Zhu, David W. Browne, Michael P. Fitz
COMPSAC
2004
IEEE
15 years 5 months ago
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. T...
Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
ICC
2007
IEEE
15 years 7 months ago
Queueing Performance of IEEE 802.16 Random Access Protocol with Bulk Transmissions
— In this paper, we consider the queueing performance of a subscriber station for IEEE802.16e random access protocol with bulk transmissions which is allowed with an ARQ protocol...
Hyong-Woo Lee, Jun-Bae Seo
IASTEDSE
2004
15 years 2 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis