Search

Showing total 96 results

Search Constraints

Start Over You searched for: Topic access control Remove constraint Topic: access control Topic algorithms Remove constraint Topic: algorithms Database Academic Search Index Remove constraint Database: Academic Search Index
96 results

Search Results

1. Privacy information protection of medical internet based on double chaos encryption algorithm.

2. A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes.

3. A Self-Localization Algorithm for Mobile Targets in Indoor Wireless Sensor Networks Using Wake-Up Media Access Control Protocol.

4. Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box.

5. Dynamic-Distance-Based Thresholding for UAV-Based Face Verification Algorithms.

6. Body Area Networking: Selected Papers from IEEE PIMRC 2009.

7. Adaptively secure CP-ABE for circuits with fan-in n and fan-out 1.

8. A fusion data security protection scheme for sensitive E-documents in the open network environment.

9. A Momentum-Based Local Face Adversarial Example Generation Algorithm.

10. Energy-Aware Medium Access Control Protocol and Clustering Algorithm for Clustered Wireless Sensor Networks with High Altitude Platforms as the Base Station.

11. Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.

12. CPACK: An Intelligent Cyber-Physical Access Control Kit for Protecting Network †.

13. 基于属性基加密的区块链数据共享模型.

14. Multi-keyword ranked search with access control for multiple data owners in the cloud.

15. 基于区块链和密文属性加密的访问控制方案.

16. SFM-MAC: Multichannel MAC Protocol for Underwater Sensor Networks Based on Underwater Passive Localization Mechanisms.

17. 支持撤销的外包加解密 CP-ABE 方案.

18. 基于格的多授权密文属性加密方案.

19. 基于以太坊平台的医疗数据安全共享方案.

20. An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud.

21. Learning nodes: machine learning-based energy and data management strategy.

22. A two‐level clustering mechanism for energy enhancement in Internet‐of‐Things‐based wireless sensor networks.

23. Scheduling Design and Performance Analysis of Carrier Aggregation in Satellite Communication Systems.

24. Fusion facial semantic feature and incremental learning mechanism for efficient face recognition.

25. Ciphertext retrieval via attribute-based FHE in cloud computing.

26. SEAPP: A secure application management framework based on REST API access control in SDN-enabled cloud environment.

27. Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid.

28. An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks.

29. An efficient algorithm to detect DDoS amplification attacks.

30. Secure auditing and deduplication for encrypted cloud data supporting ownership modification.

31. Pseudorandom sequence contention algorithm for IEEE 802.11ah based internet of things network.

32. Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile.

33. 一种轻量级的雾计算属性基外包加密算法.

34. A Modified IEEE 802.11 MAC for Optimizing Broadcasting in Wireless Audio Networks.

35. LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks.

36. Improved MAC layer protocol of Wifi for satellite network.

37. A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data.

38. Secure access control in multidomain environments and formal analysis of model specifications.

39. Application of a secure data transmission with an effective timing algorithm based on LoRa modulation and chaos.

40. 2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids.

41. Optimal bidding strategy for generation companies under CVaR constraint.

42. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

43. Channel Status based Sliding Contention Window (CS-SCW) algorithm: A Fuzzy Control Approach for Medium Access in Wireless Networks.

44. A formal modeling and analysis approach for access control rules, policies, and their combinations.

45. A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets.

46. Feedback-assisted MAC protocol for real time traffic in high rate wireless personal area networks.

47. Performance Analysis of Multichannel Medium Access Control Algorithms for Opportunistic Spectrum Access.

48. Edge-RMP: Minimizing administrative assignments for role-based access control.

49. Applying Semantic Knowledge to Real-Time Update of Access Control Policies.

50. Random-Access Control Mechanisms Using Adaptive Traffic Load in ALOHA and CSMA Strategies for EDGE.