Search

Your search keyword '"Access Control"' showing total 1,713 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Publisher springer nature Remove constraint Publisher: springer nature
1,713 results on '"Access Control"'

Search Results

1. Secure IoT data dissemination with blockchain and transfer learning techniques.

2. Blockchain-based entity access control scheme for ubiquitous UAV swarm tasks: Blockchain-based entity access control scheme...: H. Xie et al.

3. Dynamic fine-grained access control for smart contracts based on improved attribute-based signature.

4. Design of an intelligent disinfection control system based on an STM32 single-chip microprocessor by using the YOLO algorithm.

5. Energy efficient group priority MAC protocol using hybrid Q-learning honey Badger Algorithm (QL-HBA) for IoT Networks.

6. Dynamic switching of transmission modes hydroacoustic communication MAC protocols.

7. Access Control Analysis in Heterogeneous Big Data Management Systems.

8. A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology.

9. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment.

10. Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles.

11. An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption.

12. Time-limited ownership delegation scheme with revocation security for healthcare.

13. SCAC: Smart Contract-Based Access Control in IoT.

14. ESPRESSO: A Framework to Empower Search on the Decentralized Web: ESPRESSO: A Framework to Empower...: M. Ragab et al.

15. Implementing the principle of least administrative privilege on operating systems: challenges and perspectives.

16. A multi-phase scalable, communication reliable, and energy efficient MAC (SRE-MAC) protocol for WBAN.

17. A blockchain-based privacy-preserving and access-control framework for electronic health records management.

18. An efficient texture descriptor based on local patterns and particle swarm optimization algorithm for face recognition.

19. Clustering-Cum-Classification Based Machine Learning Medium Access Control Protocol for Three Tier Heterogeneous Wireless Sensor Network.

20. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

21. Business process discovery as a service with event log privacy and access control over discovered models.

22. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.

23. A smart contract-driven access control scheme with integrity checking for electronic health records.

24. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing.

25. Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action.

26. BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing.

27. BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records.

28. Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application.

29. AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.

30. A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts.

31. BBAD: Blockchain-based data assured deletion and access control system for IoT.

32. Digital twin communities: an approach for secure DT data sharing.

33. SecShield: An IoT access control framework with edge caching using software defined network.

34. Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications.

35. Linkable and traceable anonymous authentication with fine-grained access control.

36. IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks.

37. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

38. A New Hybrid MAC Protocol for UAV-based Data Gathering in Dense IoT Network Applications.

39. Advancing database security: a comprehensive systematic mapping study of potential challenges.

40. Analyzing supply chain technology trends through network analysis and clustering techniques: a patent-based study.

41. Using the ACE framework to enforce access and usage control with notifications of revoked access rights.

42. Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs.

43. Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.

44. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control.

45. Assessing women's empowerment, participation, and engagement in aquaculture in Bangladesh.

46. Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future Direction.

47. Deploying artificial intelligence in services to AID vulnerable consumers.

48. A systematic review on blockchain-based access control systems in cloud environment.

49. Access control for trusted data sharing.

50. Taste aversion learning during successive negative contrast.

Catalog

Books, media, physical & digital resources