Search

Showing total 1,665 results

Search Constraints

Start Over You searched for: Topic access control Remove constraint Topic: access control Language english Remove constraint Language: english Database Academic Search Index Remove constraint Database: Academic Search Index
1,665 results

Search Results

1. Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications.

2. Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities.

3. Digital twin communities: an approach for secure DT data sharing.

4. Downlink AP coordination based OFDMA and NOMA protocols for the next-generation WLANs.

5. Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification.

6. EMR sharing system with lightweight searchable encryption and rights management.

7. Secure electronic medical records sharing scheme based on blockchain and quantum key.

8. Paper, Paper Everywhere but None of it Controlled?

9. An efficient texture descriptor based on local patterns and particle swarm optimization algorithm for face recognition.

10. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

11. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.

12. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing.

13. IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks.

14. A Fair MAC Protocol Based on Dual Bandwidth Allocation Iterations in Underwater Acoustic Sensor Networks.

15. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.

16. Attribute-Based Designated Combiner Transitive Signature Scheme.

17. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control.

18. Optimization of handoff for joint uplink base station association and power control with max‐min fairness in NOMA small‐cell networks.

19. A cross domain access control model for medical consortium based on DBSCAN and penalty function.

20. ECDSA-secured blockchain architecture for interoperable healthcare in the Internet of Robotic Things (IoRT)

21. A bidirectional reversible and multilevel location privacy protection method based on attribute encryption.

22. A Blockchain-Based Access Control System for Secure and Efficient Hazardous Material Supply Chains.

23. A Novel Fingerprint Segmentation Method by Introducing Efficient Features and Robust Clustering Assignment Technique.

24. PrivShieldROS: An Extended Robot Operating System Integrating Ethereum and Interplanetary File System for Enhanced Sensor Data Privacy.

25. Privacy information protection of medical internet based on double chaos encryption algorithm.

26. Enhancing online health consultations through fuzzy logic-integrated attribute-based encryption system.

27. Design and implementation of trust based access control model for cloud computing.

28. Research Paper Recommender System Evaluation Using Collaborative Filtering.

29. Study: Cryptography for information security.

30. Dynamic fine-grained access control for smart contracts based on improved attribute-based signature.

31. A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology.

32. An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption.

33. Wearing: Art, the Body, and Distance.

34. Energy-Efficient Clustering in Wireless Sensor Networks Using Grey Wolf Optimization and Enhanced CSMA/CA.

35. Context-Aware Risk Attribute Access Control.

36. Deep Learning System for User Identification Using Sensors on Doorknobs.

37. Software-Defined Radio Implementation of a LoRa Transceiver.

38. SSH-MAC: Service-Aware and Scheduling-Based Media Access Control Protocol in Underwater Acoustic Sensor Network.

39. Adaptive context-aware access control for IoT environments leveraging fog computing.

40. MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review.

41. Machine learning-based intelligent security framework for secure cloud key management.

42. SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data.

43. An image partition security-sharing mechanism based on blockchain and chaotic encryption.

44. Blockchain-Based Caching Architecture for DApp Data Security and Delivery.

45. Enhancement of VoWiFi cell capacity using A‐MPDU frame aggregation technique in WiFi 6 considering VBR traffic.

46. A Multi-Phase SMO-Based MAC Protocol for IoT-Enabled WBAN Systems.

47. Cooperative Communication Based Protocols for Underwater Wireless Sensors Networks: A Review.

48. A heterogeneous graph-based semi-supervised learning framework for access control decision-making.

49. Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE.

50. Channel utilization of media access control protocols for underwater acoustic networks with propagation delay and mobilitya).