Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
The Time Division Duplex (TDD) uplink-downlink configuration of the 3GPP Long Term Evolution (LTE) determines how the ten subframes in a radio frame are divided between the downlin...
Riikka Susitaival, Henning Wiemann, J. Ostergaard,...
In this paper we present an extension to an existing hash based packet classification technique in order to improve its performance in a distributed network access control environm...
Due to node mobility and limitations on bandwidth availability in wireless channels, there exist unique challenges towards achieving efficient and effective information access in ...