Works matching Access control
1
- InfoM, 2012, n. 41, p. 33
- Sladić, Goran;
- Milosavljević, Branko;
- Konjović, Zora
- Article
2
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2025, v. 42, n. 5, p. 1490, doi. 10.19734/j.issn.1001-3695.2024.09.0334
- Article
3
- Sensors (14248220), 2020, v. 20, n. 9, p. 2464, doi. 10.3390/s20092464
- Kayes, A. S. M.;
- Kalaria, Rudri;
- Sarker, Iqbal H.;
- Islam, Md. Saiful;
- Watters, Paul A.;
- Ng, Alex;
- Hammoudeh, Mohammad;
- Badsha, Shahriar;
- Kumara, Indika
- Article
4
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 3, p. 280, doi. 10.22266/ijies2019.0630.27
- Michael, Auxilia;
- Kothandaraman, Raja;
- Kaliyan, Kannan
- Article
5
- Information Resources Management Journal, 2017, v. 30, n. 4, p. 53, doi. 10.4018/IRMJ.2017100104
- Article
6
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 2896, doi. 10.3969/j.issn.1001-3695.2013.10.004
- WANG Ming-wei;
- WANG Lie-jun;
- XIE Wei-min
- Article
7
- Journal on Communication / Tongxin Xuebao, 2025, v. 46, n. 4, p. 174, doi. 10.11959/j.issn.1000-436x.2025068
- CHAI Rong;
- AI Liping;
- YANG Ningyu;
- LIANG Chengchao
- Article
8
- Computer Systems Science & Engineering, 2006, v. 21, n. 5, p. 325
- Article
9
- Personal & Ubiquitous Computing, 2022, v. 26, n. 4, p. 971, doi. 10.1007/s00779-020-01498-w
- Chai, Baobao;
- Yan, Biwei;
- Yu, Jiguo;
- Wang, Guijuan
- Article
10
- Wireless Personal Communications, 2024, v. 138, n. 3, p. 1671, doi. 10.1007/s11277-024-11568-4
- Mishra, Rajiv Kumar;
- Yadav, Rajesh K.;
- Nath, Prem
- Article
11
- Ingénierie des Systèmes d'Information, 2020, v. 25, n. 3, p. 285, doi. 10.18280/isi.250301
- Article
12
- Information (2078-2489), 2020, v. 11, n. 2, p. 111, doi. 10.3390/info11020111
- Nyame, Gabriel;
- Qin, Zhiguang;
- Obour Agyekum, Kwame Opuni-Boachie;
- Sifah, Emmanuel Boateng
- Article
13
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 4, p. 2372, doi. 10.1007/s12083-020-00961-y
- Anilkumar, Chunduru;
- Subramanian, Sumathy
- Article
14
- Journal of Database Management, 2023, v. 34, n. 3, p. 1, doi. 10.4018/JDM.321545
- Liu, Yikai;
- Ju, Fenglan;
- Zhang, Qunwei;
- Zhang, Meng;
- Ma, Zezhong;
- Li, Mingduo;
- Yang, Aimin;
- Liu, Fengchun
- Article
15
- Journal of Database Management, 2012, v. 23, n. 2, p. 1, doi. 10.4018/jdm.2012040101
- Wang, Harry Jiannan;
- Zhao, J. Leon;
- Guoqing Chen
- Article
16
- Journal of Supercomputing, 2010, v. 54, n. 2, p. 154, doi. 10.1007/s11227-009-0306-5
- Muppavarapu, Vineela;
- Pereira, Anil L.;
- Chung, Soon M.
- Article
17
- Computers (2073-431X), 2023, v. 12, n. 11, p. 240, doi. 10.3390/computers12110240
- Hasan, Md. Rahat;
- Alazab, Ammar;
- Joy, Siddhartha Barman;
- Uddin, Mohammed Nasir;
- Uddin, Md Ashraf;
- Khraisat, Ansam;
- Gondal, Iqbal;
- Urmi, Wahida Ferdose;
- Talukder, Md. Alamin
- Article
18
- Computers (2073-431X), 2018, v. 7, n. 3, p. 39, doi. 10.3390/computers7030039
- Xu, Ronghua;
- Chen, Yu;
- Blasch, Erik;
- Chen, Genshe
- Article
19
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 11, p. N.PAG, doi. 10.1177/1550147719889330
- Zhang, Yongbin;
- Cui, Meng;
- Zheng, Lijuan;
- Zhang, Rui;
- Meng, Lili;
- Gao, Dong;
- Zhang, Yu
- Article
20
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 2, p. 1, doi. 10.1177/1550147719833566
- Nguyen, VanDung;
- Oo, Thant Zin;
- Khanh, Tran Trong;
- Hong, Choong Seon;
- Huh, Eui-Nam
- Article
21
- International Journal of Software Engineering & Knowledge Engineering, 2020, v. 30, n. 11/12, p. 1851, doi. 10.1142/S0218194020500400
- Article
22
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 26937, doi. 10.1007/s11042-023-14836-w
- Dharminder, Dharminder;
- Dadsena, Pradeep Kumar;
- Mishra, Dheerendra
- Article
23
- Multimedia Tools & Applications, 2023, v. 82, n. 12, p. 18269, doi. 10.1007/s11042-022-14010-8
- Atlam, Hany F.;
- Wills, Gary B.
- Article
24
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 239, doi. 10.1049/iet-ifs.2018.5204
- Uriarte, Mikel;
- Astorga, Jasone;
- Jacob, Eduardo;
- Huarte, Maider;
- López, Oscar
- Article
25
- Information Technology & Control, 2018, v. 47, n. 3, p. 393, doi. 10.5755/j01.itc.47.3.20330
- Boucherit, Ammar;
- Castro, Laura M.;
- Khababa, Abdallah;
- Hasan, Osman
- Article
26
- Telecommunication Systems, 2023, v. 84, n. 1, p. 1, doi. 10.1007/s11235-023-01033-1
- Pandit, Amitesh Kumar;
- Chatterjee, Kakali;
- Singh, Ashish
- Article
27
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 127, doi. 10.1007/s11235-009-9240-3
- Article
28
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 177, doi. 10.1007/s11235-009-9243-0
- Poniszewska-Maranda, Aneta
- Article
29
- WIREs: Data Mining & Knowledge Discovery, 2019, v. 9, n. 2, p. N.PAG, doi. 10.1002/widm.1282
- Article
30
- ISeCure, 2021, v. 13, n. 2, p. 117, doi. 10.22042/isecure.2021.254089.580
- Hadavi, Mohammad Ali;
- Bagherdaei, Arash;
- Ghasemi, Simin
- Article
31
- ISeCure, 2020, v. 12, n. 2, p. 126
- Zarezadeh, Maryam;
- Taluki, Maede Ashouri;
- Siavashi, Mohammad
- Article
32
- ISeCure, 2017, v. 9, n. 1, p. 73
- Safarzadeh, Marzieh;
- Taghizadeh, Mahboubeh;
- Zamani, Bahman;
- Ladani, Behrouz Tork
- Article
33
- Computers, Materials & Continua, 2024, v. 80, n. 3, p. 4663, doi. 10.32604/cmc.2024.055287
- M, Aljuaid Turkea Ayedh;
- Wahab, Ainuddin Wahid Abdul;
- Idris, Mohd Yamani Idna
- Article
34
- Computers, Materials & Continua, 2020, v. 65, n. 3, p. 2441, doi. 10.32604/cmc.2020.011824
- Hao Chen;
- Wunan Wan;
- Jinyue Xia;
- Shibin Zhang;
- Jinquan Zhang;
- Xizi Peng;
- Xingjie Fan
- Article
35
- Journal of Information Assurance & Security, 2016, v. 11, n. 6, p. 348
- Madani, Mohamed Amine;
- Erradi, Mohammed;
- Benkaouz, Yahya
- Article
36
- International Journal of Cooperative Information Systems, 2019, v. 28, n. 1, p. N.PAG, doi. 10.1142/S0218843019500035
- Mundbrod, Nicolas;
- Reichert, Manfred
- Article
37
- International Journal of Cooperative Information Systems, 2017, v. 26, n. 4, p. -1, doi. 10.1142/S0218843017500034
- Article
38
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 2, p. 150, doi. 10.1109/TDSC.2014.2320731
- Shebaro, Bilal;
- Oluwatimi, Oyindamola;
- Bertino, Elisa
- Article
39
- IEEE Transactions on Dependable & Secure Computing, 2014, v. 11, n. 5, p. 412, doi. 10.1109/TDSC.2013.42
- Gupta, Puneet;
- Stoller, Scott D.;
- Xu, Zhongyuan
- Article
40
- IAENG International Journal of Computer Science, 2023, v. 50, n. 1, p. 191
- idar, Hafsa Ait;
- Belhadaoui, Hicham;
- Filali, Reda;
- Malassé, Olaf
- Article
41
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00112-1
- Parkinson, Simon;
- Khana, Saad
- Article
42
- International Journal on Information Technologies & Security, 2024, v. 16, n. 3, p. 57
- Dadhania, Avani;
- Patel, Hiren
- Article
43
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1445, doi. 10.1007/s11277-014-1939-0
- Horng, Shi-Jinn;
- Tzeng, Shiang-Feng;
- Wang, Xian;
- Qiao, Shaojie;
- Gong, Xun;
- Khan, Muhammad
- Article
44
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 65, doi. 10.3390/cryptography6040065
- Stock, Frederick;
- Kurt Peker, Yesem;
- Perez, Alfredo J.;
- Hearst, Jarel
- Article
45
- Electronics (2079-9292), 2023, v. 12, n. 19, p. 4057, doi. 10.3390/electronics12194057
- Li, Leixiao;
- Wan, Jianxiong;
- Liu, Chuyi
- Article
46
- Electronics (2079-9292), 2022, v. 11, n. 16, p. 2536, doi. 10.3390/electronics11162536
- Han, Jiujiang;
- Li, Ziyuan;
- Liu, Jian;
- Wang, Huimei;
- Xian, Ming;
- Zhang, Yuxiang;
- Chen, Yu
- Article
47
- Electronics (2079-9292), 2021, v. 10, n. 20, p. 2478, doi. 10.3390/electronics10202478
- Cho, Chaeho;
- Seong, Yeonsang;
- Won, Yoojae
- Article
48
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 4, p. 3267, doi. 10.11591/ijece.v11i4.pp3267-3274
- Satanasaowapak, Pak;
- Kawseewai, Witawat;
- Promlee, Suchada;
- Vilamat, Anuwat
- Article
49
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 5, p. 3187, doi. 10.11591/ijece.v8i5.pp3187-3193
- Menaka, M.;
- Meenakshisundaram, K.
- Article
50
- Scalable Computing: Practice & Experience, 2011, v. 12, n. 1, p. 35
- Aneta Poniszewska-Maranda
- Article