-
101
Survey of privacy preserving data queries in cloud computing
Published 2014-12-01Subjects: Get full text
Article -
102
Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy
Published 2020-09-01Subjects: “…cross-domain access control…”
Get full text
Article -
103
Attribute-based revocable collaborative access control scheme
Published 2021-05-01Subjects: “…attribute-based collaborative access control…”
Get full text
Article -
104
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01Subjects: Get full text
Article -
105
HDFS-oriented cryptographic key resource control mechanism
Published 2022-09-01Subjects: “…cyberspace-oriented access control…”
Get full text
Article -
106
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01Subjects: “…biometrics (access control)…”
Get full text
Article -
107
Hybrid access control algorithm based on relay node assistant in Femtocell network
Published 2017-01-01Subjects: Get full text
Article -
108
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
109
A Collision Avoidance MAC Protocol with Power Control for Adaptive Clustering Underwater Sensor Networks
Published 2025-01-01Subjects: “…media access control (MAC)…”
Get full text
Article -
110
SDFAC:software defined flow access control mechanism
Published 2015-11-01Subjects: “…access control mechanism…”
Get full text
Article -
111
-
112
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01Subjects: Get full text
Article -
113
Data access control policy of encrypted deduplication system
Published 2020-05-01Subjects: Get full text
Article -
114
Effects of image compression on face image manipulation detection: A case study on facial retouching
Published 2021-05-01Subjects: “…biometrics (access control)…”
Get full text
Article -
115
Research on scheduled WLAN MAC protocol with failure retries on RoF-DAS architecture
Published 2020-03-01Subjects: Get full text
Article -
116
Credible distributed identity authentication system of microgrid based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
117
Security mechanism in access control based on non-cooperative game
Published 2014-11-01Subjects: “…access control…”
Get full text
Article -
118
Application protection in 5G cloud network using zero trust architecture
Published 2020-12-01Subjects: Get full text
Article -
119
Multi-owner accredited keyword search over encrypted data
Published 2017-11-01Subjects: Get full text
Article -
120
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01Subjects: Get full text
Article