Showing 81 - 100 results of 362 for search '"access control"', query time: 0.05s Refine Results
  1. 81
  2. 82
  3. 83

    Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method by Meiqin Tang, Lili Shang, Yalin Xin, Xiaohua Liu, Xinjiang Wei

    Published 2014-01-01
    “…A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. …”
    Get full text
    Article
  4. 84

    Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing by Ruizhong DU, Tianhe ZHANG, Pengliang SHI

    Published 2022-06-01
    “…Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a ciphertext policy hidden access control scheme based on blockchain and supporting data sharing is proposed. …”
    Get full text
    Article
  5. 85
  6. 86

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
    Get full text
    Article
  7. 87
  8. 88

    Optimization design and application of library face recognition access control system based on improved PCA. by Na Lin, Yan Ding, Yulei Tan

    Published 2025-01-01
    “…The application of face recognition technology in Library Access Control System (LACS) has an important impact on improving the security and management efficiency of the library. …”
    Get full text
    Article
  9. 89

    Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication by Jialin Guo, Fufang Li, Tian Wang, Shaobo Zhang, Yuqing Zhao

    Published 2021-04-01
    “…An adaptive parameter optimization polling-based medium access control protocol is proposed to optimize network performance. …”
    Get full text
    Article
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94

    An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks by Ye Tian, Yanbin Peng, Xinguang Peng, Hongbin Li

    Published 2014-11-01
    “…In this paper, we design an attribute-based encryption scheme for fine-grained access control in WBANs. In our scheme, a user can decrypt a ciphertext if the attributes related with a ciphertext satisfy the user's access structure. …”
    Get full text
    Article
  15. 95
  16. 96
  17. 97
  18. 98

    Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment by Seungsoo Baek, Seungjoo Kim

    Published 2014-01-01
    “…We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. …”
    Get full text
    Article
  19. 99

    User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment by Tarun Kumar, Prabhat Kumar, Suyel Namasudra

    Published 2025-01-01
    “…This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. …”
    Get full text
    Article
  20. 100

    Ultra-low-power media access control protocol based on clock drift characteristics in wireless sensor networks by Wooguil Pak

    Published 2017-07-01
    “…Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. …”
    Get full text
    Article