-
1
BIOMETRIC ACCESS CONTROL SYSTEMS BASED ON FINGERPRINTS
Published 2016-09-01“…Features of biometric access control system design for control people's access to certain facilitiesare described. …”
Get full text
Article -
2
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01“…IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. …”
Get full text
Article -
3
A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Published 2025-01-01Subjects: “…Access control (AC)…”
Get full text
Article -
4
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01Get full text
Article -
5
Access Control Points: Reducing a Possible Blast Impact by Meandering
Published 2018-01-01“…In response to the heightened terror threat in recent years, there is an increasing interest in the introduction of access control zones at sites that are characterized by an increased likelihood of being the target of a terrorist attack, as latest data reveal that unprotected areas of mass congregation of people have become attractive to terrorist groups. …”
Get full text
Article -
6
Corrigendum to Research on electronic medical record access control based on blockchain
Published 2020-05-01Get full text
Article -
7
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01“…Abstract Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. …”
Get full text
Article -
8
A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Published 2018-07-01Get full text
Article -
9
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability. …”
Get full text
Article -
10
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
11
Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain
Published 2025-01-01Get full text
Article -
12
Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital
Published 2019-10-01“…Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). …”
Get full text
Article -
13
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
Published 2014-02-01Get full text
Article -
14
Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method
Published 2014-01-01“…A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. …”
Get full text
Article -
15
On the fly biometric identification system using hand‐geometry
Published 2021-05-01Subjects: “…biometrics (access control)…”
Get full text
Article -
16
Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments
Published 2020-05-01“…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
Get full text
Article -
17
Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication
Published 2021-04-01“…An adaptive parameter optimization polling-based medium access control protocol is proposed to optimize network performance. …”
Get full text
Article -
18
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
Published 2025-01-01Subjects: “…Access control…”
Get full text
Article -
19
Lip print‐based identification using traditional and deep learning
Published 2023-01-01Subjects: “…access control…”
Get full text
Article -
20
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
Published 2014-11-01“…In this paper, we design an attribute-based encryption scheme for fine-grained access control in WBANs. In our scheme, a user can decrypt a ciphertext if the attributes related with a ciphertext satisfy the user's access structure. …”
Get full text
Article