-
61
Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks
Published 2014-05-01“…In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. …”
Get full text
Article -
62
La préparation et le passage du recensement du Soudan 2008
Published 2008-06-01“…So much stakes, identity and ressources access, control and redistribution conflicts at all scales and in every sudanese margin are pushing the census to catalyse and finally reveal the tragical limits of an ethnocratic governance.…”
Get full text
Article -
63
MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation
Published 2012-01-01“…Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). However, medium access control (MAC) layer requirements for communications in wireless sensor networks (WSNs) vary because the network is usually optimized for specific applications. …”
Get full text
Article -
64
A Secure Operational Model for Mobile Payments
Published 2014-01-01“…In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. …”
Get full text
Article -
65
Taxonomy and Evaluations of Low-Power Listening Protocols for Machine-to-Machine Networks
Published 2014-01-01“…It will also be very useful for helping M2M designers understand specific features of low-power media access control protocols as they design new M2M networks.…”
Get full text
Article -
66
Readiness of Higher Education Institutions for Digital Transformation Processes
Published 2021-07-01“…Higher education institutions have their own internal integrated information systems for managing the educational process and the educational institution as a whole. Integration of access control systems, uniform cards of students and employees of educational institutions with perimeter control into IIS "University", information protection of internal resources and IIS as a whole will significantly accelerate the digitalization of educational institutions, and as a result, a faster transition to the digital economy.…”
Get full text
Article -
67
Resource Allocation with MAC Layer Node Cooperation in Cognitive Radio Networks
Published 2010-01-01“…The proposed algorithm utilizes Medium Access Control layer mechanisms for message exchange between secondary nodes that operate in license exempt spectrum bands, in order to achieve interference mitigation. …”
Get full text
Article -
68
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
Published 2013-05-01“…User authentication is necessary for legitimate access control in WSNs. Sensors have limited processing power, bandwidth, memory, and limited communication abilities. …”
Get full text
Article -
69
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC) is proposed as a proper means for such regulation. …”
Get full text
Article -
70
Workplace surveillance: examining current instruments, limitations and legal background issues
Published 2013-01-01“…To control and monitor employees, employers may take diverse surveillance instruments into consideration: examples may be time-tracking and access control systems, e-supported systems like chip cards, RFID (radio-frequency identification) chips, human implants, various biometric systems, computer surveillance, network monitoring software, GPS tracking, telecommunication, visual and Internet monitoring, as well as surveillance of detective agencies. …”
Get full text
Article -
71
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Published 2015-02-01“…In addition, our system introduces the secure functions such as authentication/access control, and encryption/key management and secures filesystem to be run in SD and addresses a detailed secure filesystem as a key function for secure storage. …”
Get full text
Article -
72
The New Method of Sensor Data Privacy Protection for IoT
Published 2021-01-01“…On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. …”
Get full text
Article -
73
ARS: An Adaptive Retransmission Scheme for Contention-Based MAC Protocols in Underwater Acoustic Sensor Networks
Published 2015-05-01“…Due to the limited capacity and high propagation delay of underwater communication channels, contention-based media access control (MAC) protocols suffer from a low packet delivery ratio (PDR) and a high end-to-end (E2E) delay in underwater acoustic sensor networks due to the reliance on packet retransmission for reliable data delivery. …”
Get full text
Article -
74
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…We further introduce the directly revocable AB-CPREs, a primitive that enables a delegator to authorize and revoke his delegation of decryption rights dynamically and offers more flexible access control on externally stored encrypted data. Definition and security model of single-hop directly revocable AB-CPREs are given, and the first detailed construction of single-hop directly revocable AB-CPREs based on standard LWE assumptions is also proposed.…”
Get full text
Article -
75
Efficient Cross-Layer Optimization Algorithm for Data Transmission in Wireless Sensor Networks
Published 2015-01-01“…In this paper, we address the problems of joint design for channel selection, medium access control (MAC), signal input control, and power control with cooperative communication, which can achieve tradeoff between optimal signal control and power control in wireless sensor networks (WSNs). …”
Get full text
Article -
76
On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Published 2024-01-01“…., border control, crime prevention, or personal device access control. Although the accuracy of face recognition systems is generally high, they are not without flaws. …”
Get full text
Article -
77
A Conflict Avoidance Scheme for WiMedia Wireless Home Networks
Published 2013-03-01“…We propose an efficient resource reservation scheme for UWB (Ultrawideband) WPAN (Wireless Personal Area Network) with D-MAC (Distributed Medium Access Control). Since the WiMedia D-MAC supporting DRP (Distributed Reservation Protocol) scheme causes lots of conflicts due to failure of beacon detection in wireless channel environment, overall performances of the WiMedia D-MAC can be deteriorated. …”
Get full text
Article -
78
Novel Energy-Efficient Miner Monitoring System with Duty-Cycled Wireless Sensor Networks
Published 2012-01-01“…Since the localization and data transmission much depend on the media access control (MAC) scheme, codesign of localization and MAC scheme is actually needed for the resource-constrained system, which is seldom discussed in existing related works. …”
Get full text
Article -
79
Data Transmission with Reduced Delay for Distributed Acoustic Sensors
Published 2015-11-01“…This paper proposes a channel access control scheme fit to dense acoustic sensor nodes in a sensor network, where multiple acoustic sensor nodes within communication range of a cluster head are grouped into clusters. …”
Get full text
Article -
80
Exploration of optimal Wi-Fi probes layout and estimation model of real-time pedestrian volume detection
Published 2017-11-01“…Wi-Fi probes are widely used to capture and study the media access control layer information of mobile devices but often with low detection and precision. …”
Get full text
Article