Search

Your search keyword '"Access Control"' showing total 5,590 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Topic 0202 electrical engineering, electronic engineering, information engineering Remove constraint Topic: 0202 electrical engineering, electronic engineering, information engineering
5,590 results on '"Access Control"'

Search Results

1. Indirect Revocable KP-ABE With Revocation Undoing Resistance

2. A Flexible Enhanced Throughput and Reduced Overhead (FETRO) MAC Protocol for ETSI SmartBAN

3. Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment

4. Secure and practical access control mechanism for WSN with node privacy

5. LIKC: A liberty of encryption and decryption through imploration from K-cloud servers

6. RSA based encryption approach for preserving confidentiality of big data

7. Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers

8. Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage

9. Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

10. Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment

11. Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing

12. Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing

13. Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things

14. ComFlex: Composable and Flexible Resource Management for the IoT

15. Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT

16. A blockchain-based preserving and sharing system for medical data privacy

17. Capability-based IoT access control using blockchain

18. Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things

19. ProFact: A Provenance-Based Analytics Framework for Access Control Policies

20. Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems

21. PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities

22. A blockchain-empowered AAA scheme in the large-scale HetNet

23. An Intelligent Edge-Chain-Enabled Access Control Mechanism for IoV

24. A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks

25. A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

26. A novel approach of privacy-preserving data sharing system through data-tagging with role-based access control

27. A unified blockchain-based platform for global e-waste management

28. Flexible, decentralised access control for smart buildings with smart contracts

29. Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control

30. DCSS Protocol for Data Caching and Sharing Security in a 5G Network

31. A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain

32. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud

33. Secure crowd-sensing protocol for fog-based vehicular cloud

34. Fine-Grained Frequency Reuse in Centralized Small Cell Networks

35. Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things

36. Resilient Desynchronization for Decentralized Medium Access Control

37. Using Conditional Random Fields to Optimize a Self-Adaptive Bell–LaPadula Model in Control Systems

38. Methods for assessing the efficiency of access control subsystems at informatization facilities of internal affairs bodies and aspects of their improvement

39. A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture

40. Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT

41. A Common Method of Share Authentication in Image Secret Sharing

42. Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct

43. A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection

44. A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things

45. MAC for Machine-Type Communications in Industrial IoT—Part II: Scheduling and Numerical Results

46. MAC for Machine-Type Communications in Industrial IoT—Part I: Protocol Design and Analysis

47. Thorough Performance Evaluation & Analysis of the 6TiSCH Minimal Scheduling Function (MSF)

48. One enhanced secure access scheme for outsourced data

49. Power Saving and Secure Text Input for Commodity Smart Watches

50. An IoT-Applicable Access Control Model Under Double-Layer Blockchain

Catalog

Books, media, physical & digital resources