Showing 101 - 120 results of 138 for search '"access control"', query time: 0.08s Refine Results
  1. 101

    Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks by Yang Yang, Xiaoyu Jin, Su Yao, Xuesong Qiu, Liu Liu

    Published 2017-06-01
    “…How to protect sensors from attacks of malicious mobile agents becomes an important issue in the field. Traditional access control strategies such as hybrid encryption mechanism, partial results of the package, and other methods have some defects in the application. …”
    Get full text
    Article
  2. 102

    Recognition of Reconstructed Frontal Face Images Using FFT-PCA/SVD Algorithm by Louis Asiedu, Felix O. Mettle, Joseph A. Mensah

    Published 2020-01-01
    “…Modern face recognition modules/algorithms have been successful in many application areas (access control, entertainment/leisure, security system based on biometric data, and user-friendly human-machine interfaces). …”
    Get full text
    Article
  3. 103

    A plithogenic statistical approach to digital security measures and emotional health in childhood and adolescence by Carlos Hurtado, Marco Villa, Lady Raquel Caicedo Sandoval, Isea Josia

    Published 2024-11-01
    “…Utilizing a plithogenic statistical approach, which accounts for the complex, indeterminate nature of these variables, this study examined how various dimensions of digital security—including confidentiality, integrity, authentication, and access control—impact key aspects of minors' emotional well-being. …”
    Get full text
    Article
  4. 104

    An Autonomous Packet Transmission Strategy for Opportunistic Wireless Sensor Networks by Hakki Soy, Özgür Özdemir, Mehmet Bayrak

    Published 2012-11-01
    “…Proposed schemes are based on the principle of cross-layer design that integrates with physical layer characteristics of wireless channel and medium access control (MAC) layer characteristics of network. …”
    Get full text
    Article
  5. 105

    Scalable Video Streaming for Single-Hop Wireless Networks Using a Contention-Based Access MAC Protocol by Monchai Lertsutthiwong, Thinh Nguyen, Alan Fern

    Published 2008-01-01
    “…This paper aims to enhance the quality of video streaming applications in wireless home networks via a joint optimization of video layer-allocation technique, admission control algorithm, and medium access control (MAC) protocol. Using an Aloha-like MAC protocol, we propose a novel admission control framework, which can be viewed as an optimization problem that maximizes the average quality of admitted videos, given a specified minimum video quality for each flow. …”
    Get full text
    Article
  6. 106

    Research on Public Administration and Resource Allocation Based on Blockchain and Structured Occupational Therapy by Qiyou Zhu

    Published 2022-01-01
    “…On the basis of summarizing and analyzing the previous published literatures, this study expounded the research status and significance of public administration and resource allocations; elaborated the development background, current status and future challenges of blockchain, and structured occupational therapy; introduced the methods and principles of data quality collaboration model and multiparty collaboration standard management; analyzed the case background of public administration and resource allocation in the prevention and control of the COVID-19 epidemic; discussed the public administration mechanism based on blockchain and structured occupational therapy; established a resource allocation method based on blockchain and structured occupational therapy; fathomed the role of the distributed ledger established by blockchain to increase the information symmetry of public administration activities; proposed a blockchain-established special machine trust for resource allocation; and finally, anatomized the data security sharing and access control mechanism based on blockchain and structured occupational therapy. …”
    Get full text
    Article
  7. 107

    A scalable neighbor-based routing protocol for mobile ad hoc networks by Ali Mohamed E Ejmaa, Shamala Subramaniam, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi

    Published 2016-09-01
    “…Simulation results show that scalable neighbor-based mobile routing outperforms both protocols, the neighbor coverage-based probabilistic rebroadcast and the ad hoc on-demand distance vector, in terms of routing overhead, medium access control collision, end-to-end delay, packet delivery ratio, and energy consumption.…”
    Get full text
    Article
  8. 108

    Modeling MAC Protocol Based on Frame Slotted Aloha for Low Energy Critical Infrastructure Sensor Networks by Niamat Ullah, Kifayat Ullah, S. M. Riazul Islam, Pervaiz Khan, Sana Ullah, Kyung Sup Kwak

    Published 2015-06-01
    “…We propose and analyse a medium access control (MAC) protocol for low energy critical infrastructure monitoring (LECIM) networks. …”
    Get full text
    Article
  9. 109

    Feature Extraction in Densely Sensed Environments: Extensions to Multiple Broadcast Domains by Maryam Vahabi, Vikram Gupta, Michele Albano, Raghuraman Rangarajan, Eduardo Tovar

    Published 2015-08-01
    “…In this paper, we present a feature extraction mechanism for dense networks that takes advantage of dominance-based medium access control (MAC) protocols to (i) efficiently obtain global extrema of the sensed quantities, (ii) extract local extrema, and (iii) detect the boundaries of events, by using simple transforms that nodes employ on their local data. …”
    Get full text
    Article
  10. 110

    Improved integral cryptanalysis of SPNbox in digital rights management systems by Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang

    Published 2023-01-01
    “…Abstract As an access control technology of digital material, digital rights management systems have a profound effect on the copyright protection of digital content. …”
    Get full text
    Article
  11. 111

    IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality by Gongliang Liu, Xinrui Fang, Wenjing Kang

    Published 2014-01-01
    “…In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. …”
    Get full text
    Article
  12. 112

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. …”
    Get full text
    Article
  13. 113

    Implementation of CSMA/CA-Based MAC Protocol for Optical Camera Communication by Muhammad Miftah Faridh, Herfandi Herfandi, Ones Sanjerico Sitanggang, Muhammad Rangga Aziz Nasution, Huy Nguyen, Yeong Min Jang

    Published 2025-01-01
    “…However, OCC faces challenges in medium access management, which necessitates the development of effective medium access control (MAC) protocols. The IEEE 802.15.7 standard proposes MAC protocols tailored for various OCC modes and simplifies frame structures. …”
    Get full text
    Article
  14. 114

    Research on Mental Health Monitoring Scheme of Migrant Children Based on Convolutional Neural Network Based on Deep Learning by Guangyan Yang

    Published 2022-01-01
    “…In order to obtain a better identification effect of mental health problems of children, this paper attempts to use multisource data, including consumption data, access control data, network logs, and grade data, and proposes a multisource data-based mental health problem identification algorithm. …”
    Get full text
    Article
  15. 115

    Using Shadow Page Cache to Improve Isolated Drivers Performance by Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Zhengdong Zhu, Chengzhe Liu

    Published 2015-01-01
    “…In order to prevent users’ virtualization environments being impacted by driver faults in virtual machine, Chariot examines the correctness of driver’s write operations by the method of combining a driver’s write operation capture and a driver’s private access control table. However, this method needs to keep the write permission of shadow page table as read-only, so as to capture isolated driver’s write operations through page faults, which adversely affect the performance of the driver. …”
    Get full text
    Article
  16. 116

    Reinforcement Learning-Based Routing Protocol to Minimize Channel Switching and Interference for Cognitive Radio Networks by Tauqeer Safdar Malik, Mohd Hilmi Hasan

    Published 2020-01-01
    “…In the existing network-layered architectural stack of Cognitive Radio Ad Hoc Network (CRAHN), channel selection is performed at the Medium Access Control (MAC) layer. However, routing is done on the network layer. …”
    Get full text
    Article
  17. 117

    Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service by Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang

    Published 2019-04-01
    “…Ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decryption key and a semi-honest authority may illegally issue decryption keys for unauthorized users for profits. …”
    Get full text
    Article
  18. 118

    Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics by Yao Xu, Jixin Wei, Ting Mi, Zhihua Chen

    Published 2024-12-01
    “…To address these challenges, this article proposes technical countermeasures such as utilizing diverse Privacy Enhancing Technologies (PETs) to enhance data anonymity, optimizing data encryption techniques, and reinforcing data monitoring and access control management. Legal measures should include establishing a comprehensive data security protection framework, clarifying accountability, and developing standards for the classification and grading of autonomous vehicle data. …”
    Get full text
    Article
  19. 119

    A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments by Jakkarin Lapmoon, Somchart Fugkeaw

    Published 2025-01-01
    “…In this paper, we proposed VERDUP, a verifiable and secure deduplication scheme with the support of real-time data integrity checking and fine-grained access control specifically designed for IIoT environments. …”
    Get full text
    Article
  20. 120

    Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures by Renato Lo Cigno, Francesco Gringoli, Stefania Bartoletti, Marco Cominelli, Lorenzo Ghiro, Samuele Zanini

    Published 2025-01-01
    “…In fact, ISAC operates in the wireless PHY and Medium Access Control (MAC) layers, where it is impossible to protect information with standard encryption techniques or with any other purely digital methodologies. …”
    Get full text
    Article