Search

Your search keyword '"Access Control"' showing total 48,606 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control"
48,606 results on '"Access Control"'

Search Results

51. Contribution Measurement in Privacy-Preserving Federated Learning.

52. Specifying and Verifying Information Flow Control in SELinux Configurations.

53. Exploring the interplay between intellectual property models and sustainability transitions: A multi‐level analysis.

54. APPLICATION OF BLOCKCHAIN IN IT INFRASTRUCTURE MANAGEMENT: NEW OPPORTUNITIES FOR SECURITY ASSURANCE.

55. DeepSLM: Speckle‐Licensed Modulation via Deep Adversarial Learning for Authorized Optical Encryption and Decryption.

56. B-ERAC: BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION.

57. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

58. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

59. Hybrid Duplex Medium Access Control Protocol for Tsunami Early Warning Systems in Underwater Networks.

60. A Real-Time System Status Evaluation Method for Passive UHF RFID Robots in Dynamic Scenarios.

61. Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action.

62. BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing.

63. BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records.

64. A Systematic Review and Comparative Analysis Approach to Boom Gate Access Using Plate Number Recognition.

65. Access Control Verification in Smart Contracts Using Colored Petri Nets.

66. 基于主从多链的科学数据共享方法构建与实证研究.

67. An optimized dynamic attribute-based searchable encryption scheme.

68. Nonmedical cannabis legalization policy in Canada: Has commercialization been a pivotal mistake for public health?

69. IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks.

70. A Fair MAC Protocol Based on Dual Bandwidth Allocation Iterations in Underwater Acoustic Sensor Networks.

71. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

72. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.

73. Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever‐evolving relationships.

74. An improved smart contract-based bring your own device (BYOD) security control framework.

75. A New Hybrid MAC Protocol for UAV-based Data Gathering in Dense IoT Network Applications.

76. The Political Economy of Shock‑Responsive Social Protection: Analysis from Malaw.

77. طراحی مدل حفاظت از حریم خصوصی مشتریان اینترنتی حوزه سلامت.

78. Advancing database security: a comprehensive systematic mapping study of potential challenges.

79. Federated finger vein presentation attack detection for various clients.

80. Value of Dual Arterial Access for Improved Angiographic Control for Double-Lumen Arterial Balloon Onyx Embolization of Multifeeder Complex Cranial Dural Arteriovenous Fistulas: A Technical Nuance.

81. Attribute-Based Designated Combiner Transitive Signature Scheme.

82. Analyzing supply chain technology trends through network analysis and clustering techniques: a patent-based study.

83. Using the ACE framework to enforce access and usage control with notifications of revoked access rights.

84. Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs.

85. Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.

86. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control.

87. Assessing women's empowerment, participation, and engagement in aquaculture in Bangladesh.

88. 面向物联网的基于智能合约与CP-ABE的访问控制方案.

89. Voluntary self-exclusion from gambling: Expert opinions on gaps and needs for improvement.

90. Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future Direction.

91. Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations.

92. Multi-Fusion Biometric Authentication using Minutiae-Driven Fixed-Size Template Matching (MFTM).

93. Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud.

94. Measuring Enterprise Resource Planning (ERP) Software Risk Management for Digital SMEs.

95. BIoT Smart Switch-Embedded System Based on STM32 and Modbus RTU—Concept, Theory of Operation and Implementation.

96. Intelligent and Secure Cloud–Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment.

97. Adaptive MAC Scheme for Interference Management in Ad Hoc IoT Networks.

98. Comparative Assessment of Expected Safety Performance of Freeway Automated Vehicle Managed Lanes.

99. Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System.

100. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption.

Catalog

Books, media, physical & digital resources