Search

Your search keyword '"Access Control"' showing total 19,412 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Search Limiters Full Text Remove constraint Search Limiters: Full Text
19,412 results on '"Access Control"'

Search Results

1. Age Verification Systems Will Be a Personal Identifiable Information Nightmare.

2. Guide to Attribute Based Access Control (ABAC) definition and considerations

3. A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology.

4. Examining nurses' awareness level and compliance between defined and required access levels to core functionalities of hospital information system : an observational and survey study.

5. Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things.

6. Rethinking Regulation beyond the Normative Threshold: Mechanisms of Control and Access to the Central Market of Kinshasa.

7. ESPRESSO: A Framework to Empower Search on the Decentralized Web: ESPRESSO: A Framework to Empower...: M. Ragab et al.

8. Enhancing Security in Smart Renewable Energy Grids Through Proxy Signcryption Approach.

9. Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment †.

10. Enhancing Iris Authentication for Managing Multiple Cancellations: Leveraging Quotient Filters.

11. An efficient texture descriptor based on local patterns and particle swarm optimization algorithm for face recognition.

12. TL-ABKS: Traceable and lightweight attribute-based keyword search in edge–cloud assisted IoT environment.

13. Person Identification Using Temporal Analysis of Facial Blood Flow.

14. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

15. Stalk-eyed flies carrying a driving X chromosome compensate by increasing fight intensity.

16. Data-Sharing System with Attribute-Based Encryption in Blockchain and Privacy Computing †.

17. Privacy-Preserving ConvMixer Without Any Accuracy Degradation Using Compressible Encrypted Images.

18. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

19. Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures.

20. Unraveling the multiple facilitative effects of consumers on marine primary producers.

21. Energy Efficiency Optimization for D2D Communication with Statistical Channel State Information and QoS Awareness.

22. Securing IoMT Applications: An Approach for Enhancing the Reliability of Security Policies within Cloud Databases.

23. Contribution Measurement in Privacy-Preserving Federated Learning.

24. Exploring the interplay between intellectual property models and sustainability transitions: A multi‐level analysis.

25. DeepSLM: Speckle‐Licensed Modulation via Deep Adversarial Learning for Authorized Optical Encryption and Decryption.

26. B-ERAC: BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION.

27. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

28. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

29. Hybrid Duplex Medium Access Control Protocol for Tsunami Early Warning Systems in Underwater Networks.

30. A Real-Time System Status Evaluation Method for Passive UHF RFID Robots in Dynamic Scenarios.

31. A Systematic Review and Comparative Analysis Approach to Boom Gate Access Using Plate Number Recognition.

32. Access Control Verification in Smart Contracts Using Colored Petri Nets.

33. An optimized dynamic attribute-based searchable encryption scheme.

34. IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks.

35. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.

36. Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever‐evolving relationships.

37. An improved smart contract-based bring your own device (BYOD) security control framework.

38. The Political Economy of Shock‑Responsive Social Protection: Analysis from Malaw.

39. طراحی مدل حفاظت از حریم خصوصی مشتریان اینترنتی حوزه سلامت.

40. Federated finger vein presentation attack detection for various clients.

41. Attribute-Based Designated Combiner Transitive Signature Scheme.

42. Analyzing supply chain technology trends through network analysis and clustering techniques: a patent-based study.

43. 面向物联网的基于智能合约与CP-ABE的访问控制方案.

44. Voluntary self-exclusion from gambling: Expert opinions on gaps and needs for improvement.

45. BIoT Smart Switch-Embedded System Based on STM32 and Modbus RTU—Concept, Theory of Operation and Implementation.

46. Intelligent and Secure Cloud–Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment.

47. Adaptive MAC Scheme for Interference Management in Ad Hoc IoT Networks.

48. Comparative Assessment of Expected Safety Performance of Freeway Automated Vehicle Managed Lanes.

49. Deploying artificial intelligence in services to AID vulnerable consumers.

50. Examining nurses’ awareness level and compliance between defined and required access levels to core functionalities of hospital information system : an observational and survey study

Catalog

Books, media, physical & digital resources