Search

Showing total 468 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic access control Remove constraint Topic: access control Publication Year Range This year Remove constraint Publication Year Range: This year
468 results

Search Results

1. ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment.

3. Gabor, LBP, and BSIF features: Which is more appropriate for finger-knuckles-print recognition?

4. Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN).

5. EMR sharing system with lightweight searchable encryption and rights management.

6. Downlink AP coordination based OFDMA and NOMA protocols for the next-generation WLANs.

7. Advanced Cybersecurity Strategies in Cloud Computing: Techniques for Data Protection and Privacy.

8. Secure electronic medical records sharing scheme based on blockchain and quantum key.

9. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

10. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption.

11. BIoT Smart Switch-Embedded System Based on STM32 and Modbus RTU—Concept, Theory of Operation and Implementation.

12. A systematic review on blockchain-based access control systems in cloud environment.

13. Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents.

14. A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes.

15. Enhancing online health consultations through fuzzy logic-integrated attribute-based encryption system.

16. Machine learning-based intelligent security framework for secure cloud key management.

17. Secure and privacy-preserving sharing of personal health records with multi-party pre-authorization verification.

18. Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions.

19. An image partition security-sharing mechanism based on blockchain and chaotic encryption.

20. Cloud-Based Access Control Including Time and Location.

21. Medium Access Control Layer for Internet of Things Edge-Side Network Using Carrier-Sense Multiple Access Protocol †.

22. A State-Interactive MAC Layer TDMA Protocol Based on Smart Antennas.

23. An Efficient Lightweight Authentication and Access Control for IoT Edge Devices.

24. Secure Sharing of Electronic Medical Records Based on Blockchain.

25. An access control model based on blockchain master-sidechain collaboration.

26. A systematic literature review of authorization and access control requirements and current state of the art for different database models.

27. PrivShieldROS: An Extended Robot Operating System Integrating Ethereum and Interplanetary File System for Enhanced Sensor Data Privacy.

28. State-of-the-Art and New Challenges in 5G Networks with Blockchain Technology.

29. RETRACTED: Cloud-based secure data storage and access control for internet of medical things using federated learning.

30. Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications.

31. Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities.

32. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

33. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.

34. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing.

35. IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks.

36. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.

37. Attribute-Based Designated Combiner Transitive Signature Scheme.

38. Voluntary self-exclusion from gambling: Expert opinions on gaps and needs for improvement.

39. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control.

40. Intelligent and Secure Cloud–Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment.

41. Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System.

42. Comparative Assessment of Expected Safety Performance of Freeway Automated Vehicle Managed Lanes.

43. A cross domain access control model for medical consortium based on DBSCAN and penalty function.

44. Access control for trusted data sharing.

45. A bidirectional reversible and multilevel location privacy protection method based on attribute encryption.

46. A Blockchain-Based Access Control System for Secure and Efficient Hazardous Material Supply Chains.

47. Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment.

48. 基于电力云边协同的非侵入式 Modbus TCP 协议 安全增强方法.

49. Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach.

50. Securing laboratories through internet of things networks: a comprehensive approach for ensuring safety and efficiency.