Showing 61 - 80 results of 138 for search '"access control"', query time: 0.08s Refine Results
  1. 61

    Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks by Xenofon Fafoutis, Charalampos Orfanidis, Nicola Dragoni

    Published 2014-05-01
    “…In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. …”
    Get full text
    Article
  2. 62

    La préparation et le passage du recensement du Soudan 2008 by Eric Denis, Julien Dupuy

    Published 2008-06-01
    “…So much stakes, identity and ressources access, control and redistribution conflicts at all scales and in every sudanese margin are pushing the census to catalyse and finally reveal the tragical limits of an ethnocratic governance.…”
    Get full text
    Article
  3. 63

    MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation by Joseph Kabara, Maria Calle

    Published 2012-01-01
    “…Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). However, medium access control (MAC) layer requirements for communications in wireless sensor networks (WSNs) vary because the network is usually optimized for specific applications. …”
    Get full text
    Article
  4. 64

    A Secure Operational Model for Mobile Payments by Tao-Ku Chang

    Published 2014-01-01
    “…In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. …”
    Get full text
    Article
  5. 65

    Taxonomy and Evaluations of Low-Power Listening Protocols for Machine-to-Machine Networks by Kwang-il Hwang, Sung-Hyun Yoon

    Published 2014-01-01
    “…It will also be very useful for helping M2M designers understand specific features of low-power media access control protocols as they design new M2M networks.…”
    Get full text
    Article
  6. 66

    Readiness of Higher Education Institutions for Digital Transformation Processes by A. N. Markov, S. A. Migalevich

    Published 2021-07-01
    “…Higher education institutions have their own internal integrated information systems for managing the educational process and the educational institution as a whole. Integration of access control systems, uniform cards of students and employees of educational institutions with perimeter control into IIS "University", information protection of internal resources and IIS as a whole will significantly accelerate the digitalization of educational institutions, and as a result, a faster transition to the digital economy.…”
    Get full text
    Article
  7. 67

    Resource Allocation with MAC Layer Node Cooperation in Cognitive Radio Networks by Andreas Merentitis, Dionysia Triantafyllopoulou

    Published 2010-01-01
    “…The proposed algorithm utilizes Medium Access Control layer mechanisms for message exchange between secondary nodes that operate in license exempt spectrum bands, in order to achieve interference mitigation. …”
    Get full text
    Article
  8. 68

    An Efficient Biometric Authentication Protocol for Wireless Sensor Networks by Ohood Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan

    Published 2013-05-01
    “…User authentication is necessary for legitimate access control in WSNs. Sensors have limited processing power, bandwidth, memory, and limited communication abilities. …”
    Get full text
    Article
  9. 69

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC) is proposed as a proper means for such regulation. …”
    Get full text
    Article
  10. 70

    Workplace surveillance: examining current instruments, limitations and legal background issues by Ulrike Hugl

    Published 2013-01-01
    “…To control and monitor employees, employers may take diverse surveillance instruments into consideration: examples may be time-tracking and access control systems, e-supported systems like chip cards, RFID (radio-frequency identification) chips, human implants, various biometric systems, computer surveillance, network monitoring software, GPS tracking, telecommunication, visual and Internet monitoring, as well as surveillance of detective agencies. …”
    Get full text
    Article
  11. 71

    A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Su-Wan Park, JaeDeok Lim, Jeong Nyeo Kim

    Published 2015-02-01
    “…In addition, our system introduces the secure functions such as authentication/access control, and encryption/key management and secures filesystem to be run in SD and addresses a detailed secure filesystem as a key function for secure storage. …”
    Get full text
    Article
  12. 72

    The New Method of Sensor Data Privacy Protection for IoT by Yue Wu, Liangtu Song, Lei Liu

    Published 2021-01-01
    “…On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. …”
    Get full text
    Article
  13. 73

    ARS: An Adaptive Retransmission Scheme for Contention-Based MAC Protocols in Underwater Acoustic Sensor Networks by Thi-Tham Nguyen, Seokhoon Yoon

    Published 2015-05-01
    “…Due to the limited capacity and high propagation delay of underwater communication channels, contention-based media access control (MAC) protocols suffer from a low packet delivery ratio (PDR) and a high end-to-end (E2E) delay in underwater acoustic sensor networks due to the reliance on packet retransmission for reliable data delivery. …”
    Get full text
    Article
  14. 74

    Improved AB-CPREs with Revocability and HRA Security under LWE by Yang Wang, Mingqiang Wang

    Published 2024-01-01
    “…We further introduce the directly revocable AB-CPREs, a primitive that enables a delegator to authorize and revoke his delegation of decryption rights dynamically and offers more flexible access control on externally stored encrypted data. Definition and security model of single-hop directly revocable AB-CPREs are given, and the first detailed construction of single-hop directly revocable AB-CPREs based on standard LWE assumptions is also proposed.…”
    Get full text
    Article
  15. 75

    Efficient Cross-Layer Optimization Algorithm for Data Transmission in Wireless Sensor Networks by Chengtie Li, Jinkuan Wang, Mingwei Li

    Published 2015-01-01
    “…In this paper, we address the problems of joint design for channel selection, medium access control (MAC), signal input control, and power control with cooperative communication, which can achieve tradeoff between optimal signal control and power control in wireless sensor networks (WSNs). …”
    Get full text
    Article
  16. 76

    On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition by Jascha Kolberg, Yannik Schäfer, Christian Rathgeb, Christoph Busch

    Published 2024-01-01
    “…., border control, crime prevention, or personal device access control. Although the accuracy of face recognition systems is generally high, they are not without flaws. …”
    Get full text
    Article
  17. 77

    A Conflict Avoidance Scheme for WiMedia Wireless Home Networks by Kyeong Hur, Won-Sung Sohn, YangSun Lee

    Published 2013-03-01
    “…We propose an efficient resource reservation scheme for UWB (Ultrawideband) WPAN (Wireless Personal Area Network) with D-MAC (Distributed Medium Access Control). Since the WiMedia D-MAC supporting DRP (Distributed Reservation Protocol) scheme causes lots of conflicts due to failure of beacon detection in wireless channel environment, overall performances of the WiMedia D-MAC can be deteriorated. …”
    Get full text
    Article
  18. 78

    Novel Energy-Efficient Miner Monitoring System with Duty-Cycled Wireless Sensor Networks by Peng Guo, Tao Jiang, Kui Zhang

    Published 2012-01-01
    “…Since the localization and data transmission much depend on the media access control (MAC) scheme, codesign of localization and MAC scheme is actually needed for the resource-constrained system, which is seldom discussed in existing related works. …”
    Get full text
    Article
  19. 79

    Data Transmission with Reduced Delay for Distributed Acoustic Sensors by Hyun-Gyu Ryu, Sang-Keum Lee, Dongsoo Har

    Published 2015-11-01
    “…This paper proposes a channel access control scheme fit to dense acoustic sensor nodes in a sensor network, where multiple acoustic sensor nodes within communication range of a cluster head are grouped into clusters. …”
    Get full text
    Article
  20. 80

    Exploration of optimal Wi-Fi probes layout and estimation model of real-time pedestrian volume detection by Yuchuan Du, Jinsong Yue, Yuxiong Ji, Lijun Sun

    Published 2017-11-01
    “…Wi-Fi probes are widely used to capture and study the media access control layer information of mobile devices but often with low detection and precision. …”
    Get full text
    Article