Showing 41 - 60 results of 138 for search '"access control"', query time: 0.07s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50

    A practical Guide to Internet Filters / by Schneider, Karen G.

    Published 1997
    Subjects: “…Internet Access control United States. 10496…”
    View in OPAC
    Book
  11. 51

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems. …”
    Get full text
    Article
  12. 52

    An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud by Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu

    Published 2020-02-01
    “…How to realize fine-grained access control of those data on cloud becomes an urgent problem. …”
    Get full text
    Article
  13. 53

    Modeling and Analyzing CSMA/CA Protocol for Energy-Harvesting Wireless Sensor Networks by Zhi Chen, Ya Peng, Wenjing Yue

    Published 2015-09-01
    “…Well-designed wireless sensor networks (WSNs) usually provide vital support for collecting, processing, and forwarding the real-time information in mission-critical applications where medium access control (MAC) protocols determine the channel access control capabilities and the energy consumption properties of these networks. …”
    Get full text
    Article
  14. 54

    Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network by Weiheng Jiang, Wenjiang Feng

    Published 2015-01-01
    “…The result indicates that our nonconvex joint power allocation is equivalent to a joint MS access control and power allocation. Then, by problem relaxation and the alternating optimization approach, two suboptimal joint MS access control and power allocation algorithms are proposed. …”
    Get full text
    Article
  15. 55

    A Survey of Research Progress and Development Tendency of Attribute-Based Encryption by Liaojun Pang, Jie Yang, Zhengtao Jiang

    Published 2014-01-01
    “…It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. …”
    Get full text
    Article
  16. 56

    Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation by Yuan Zhai, Tao Wang, Yanwei Zhou, Feng Zhu, Bo Yang

    Published 2025-01-01
    “…Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. …”
    Get full text
    Article
  17. 57

    A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices by Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. …”
    Get full text
    Article
  18. 58

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
    Get full text
    Article
  19. 59

    Interconnection algorithm of a wide range of pervasive devices for the Internet of things by Tao Chi, Ming Chen

    Published 2018-01-01
    “…The physical layer behaviors consist of what frequency is used, how and when signals are transmitted, and how transceivers’ responses are decoded. The medium access control layer behavior consists of how to provide a reliable link between two peer medium access control entities. …”
    Get full text
    Article
  20. 60

    Web-Based File Sharing System: A Case Study of Kabale University. by Akandinda, Abraham

    Published 2023
    “…The aim of this research study was to design and implement a distributed web-based file sharing and access control system that would provide users with an online storage and sharing platform and at the same time, with sufficient security means. …”
    Get full text
    Thesis