Search

Your search keyword '"Access Control"' showing total 7,665 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Topic computer network Remove constraint Topic: computer network
7,665 results on '"Access Control"'

Search Results

1. A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System

2. SeUpdate: Secure Encrypted Data Update for Multi-User Environments

3. Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings

4. An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services

5. IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks

6. Data Access Control in Cloud Computing: Flexible and Receiver Extendable

7. A Flexible Enhanced Throughput and Reduced Overhead (FETRO) MAC Protocol for ETSI SmartBAN

8. A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System

9. Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment

10. A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing

11. Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT

12. Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message

13. Secure and practical access control mechanism for WSN with node privacy

14. LIKC: A liberty of encryption and decryption through imploration from K-cloud servers

15. A Robust Access Control Protocol for the Smart Grid Systems

17. Multiple access control scheme for EHRs combining edge computing with smart contracts

18. Secure User Authentication Leveraging Keystroke Dynamics via Wi-Fi Sensing

19. An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system

20. A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT

21. Decentralized Attribute-Based Server-Aid Signature in the Internet of Things

22. Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains (DANCIS)

23. Revocable Attribute-Based Data Storage in Mobile Clouds

24. Security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs

25. Blockchain-Enabled Data-Sharing Scheme for Consumer IoT Applications

26. Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption

27. Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

28. Lattice-based public key searchable encryption with fine-grained access control for edge computing

29. Multi-Channel Opportunistic Access for Heterogeneous Networks Based on Deep Reinforcement Learning

30. A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing

31. MAC Protocols for IEEE 802.11ah-Based Internet of Things: A Survey

32. An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

33. Scalable, Confidential and Survivable Software Updates

34. Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage

35. An efficient fine-grained data access control system with a bounded service number

36. A Collateral Sensor Data Sharing Framework for Decentralized Healthcare Systems

37. STREAM: Medium Access Control With Station Presence Awareness in Crowded Networks

38. SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks

39. A decentralized framework for device authentication and data security in the next generation internet of medical things

40. ECC-based lightweight authentication and access control scheme for IoT E-healthcare

41. BFR-SE: A Blockchain-Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine-Grained Access Control in Cloud Environment

42. A Review of MAC Layer for Wireless Body Area Network

43. Design of the Wireless Network Hierarchy System of Intelligent City Industrial Data Management Based on SDN Network Architecture

44. A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures

45. Analysis of Security-Based Access Control Models for Cloud Computing

46. Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things

47. Association Control for User Centric Millimeter Wave Communication Systems

48. Capability-based IoT access control using blockchain

49. DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles

50. A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks

Catalog

Books, media, physical & digital resources