Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
121
Open access to scientific publications - an analysis of the barriers to change
Published 2004-01-01Subjects: Get full text
Article -
122
Blockchain-based access control mechanism for data traceability
Published 2020-12-01Subjects: Get full text
Article -
123
Data access control policy of encrypted deduplication system
Published 2020-05-01Subjects: Get full text
Article -
124
Power IMS access network evolution and integrated method
Published 2015-12-01Subjects: Get full text
Article -
125
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01Get full text
Article -
126
Accessing ultrastable glass via a bulk transformation
Published 2025-01-01“…Here, we demonstrate an approach to accessing ultrastable glasses via the glass-to-glass transition, a bulk transformation that is inherently free from size constraints and anisotropy. …”
Get full text
Article -
127
Design and implement of integrative access layer in campus network
Published 2014-10-01Subjects: “…access layer network…”
Get full text
Article -
128
Discovering Accessible Financial Systems Resources for Emergent Users
Published 2025-01-01Subjects: “…Accessibility…”
Get full text
Article -
129
Unhindered Access to Hospital Buildings: A Neglected Domain
Published 2024-12-01Subjects: “…access…”
Get full text
Article -
130
Multi-authority ABS supporting dendritic access structure
Published 2017-07-01Subjects: Get full text
Article -
131
Coronary Angiography Safety between Transradial and Transfemoral Access
Published 2016-01-01“…The present study shows that transradial access for coronary angiography is safe among patients compared to transfemoral access with lower rate of local vascular complications.…”
Get full text
Article -
132
Anonymous access protocol for media independent information service
Published 2010-01-01“…For anonymous access requirements of media independent information service(MIIS) in heterogeneous networks,an access protocol with user anonymity was proposed.With the aid of the home server,the mobile user and the information server mutually authenticated each other while keeping the mobile user anonymous.Compared with other schemes,the proposed protocol has better performance,and it is provably secure in the CK model.…”
Get full text
Article -
133
Mimic defense authentication method for physical access control
Published 2020-06-01Subjects: “…access control…”
Get full text
Article -
134
Attribute-based encryption with hidden policies in the access tree
Published 2015-09-01Subjects: Get full text
Article -
135
Addressing Mobility in Wireless Sensor Media Access Protocol
Published 2005-01-01Get full text
Article -
136
New multiple access and waveform technology for 6G
Published 2022-10-01Subjects: “…pattern division multiple access…”
Get full text
Article -
137
Fused access control scheme for sensitive data sharing
Published 2014-08-01Subjects: Get full text
Article -
138
Performance analysis of random access network with post-backoff
Published 2016-02-01Subjects: “…random access network…”
Get full text
Article -
139
Multilevel secure access control policy for distributed systems
Published 2017-08-01“…A multilevel secure access control strategy for distributed system was proposed,which could guarantee the data confidentiality and security,through adding platform and middleware modules.The security policy was described in the XACML language,and the security and flexibility of the policy were analyzed.…”
Get full text
Article -
140
Equitable access to sustainable healthcare services for children with autism
Published 2025-02-01Subjects: Get full text
Article