Works matching Computer access control
2
- New Perspectives on Healthcare Risk Management, Control & Governance, 2015, v. 34, n. 1, p. 28
- Article
3
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 2, p. 292
- Santra, A. K.;
- Nagarajan, S.
- Article
4
- South African Journal of Information Management, 2015, v. 17, n. 1, p. 1, doi. 10.4102/sajim.v17i1.638
- Butler, Rika;
- Butler, Martin
- Article
6
- Business Consultant / Poslovni Konsultant, 2020, v. 12, n. 99, p. 76
- Lazović, Gordana;
- Hodžic, Nedžad
- Article
7
- Entropy, 2018, v. 20, n. 5, p. 319, doi. 10.3390/e20050319
- Benito Peral, Alberto;
- Sandoval Orozco, Ana Lucila;
- García Villalba, Luis Javier;
- Tai-Hoon Kim
- Article
8
- Egyptian Computer Science Journal, 2013, v. 37, n. 5, p. 16
- Haider, Adel Sallam M.;
- Arasi, Munya Abdulmajid
- Article
9
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 5, p. 243, doi. 10.1080/19393555.2012.694978
- Shankar, T.N.;
- Sahoo, G.;
- Niranjan, S.
- Article
10
- Wireless Personal Communications, 2016, v. 90, n. 1, p. 175, doi. 10.1007/s11277-016-3338-1
- Article
11
- Strategic Finance, 2004, v. 86, n. 2, p. 53
- Article
12
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2323, doi. 10.1002/sec.1494
- Sánchez-Carmona, Adrián;
- Robles, Sergi;
- Borrego, Carlos
- Article
13
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3219, doi. 10.1002/sec.1246
- Lu, Yanrong;
- Li, Lixiang;
- Peng, Haipeng;
- Yang, Yixian
- Article
14
- Security & Communication Networks, 2015, v. 8, n. 5, p. 740, doi. 10.1002/sec.1021
- Baek, Joonsang;
- Byon, Young-ji;
- Hableel, Eman;
- Al-Qutayri, Mahmoud
- Article
15
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1419
- Sreedevi, M.;
- Seshadri, R.
- Article
16
- Computer Journal, 2016, v. 59, n. 4, p. 462, doi. 10.1093/comjnl/bxv060
- VELOUDIS, SIMEON;
- NISSANKE, NIMAL
- Article
17
- Journal of Web Engineering, 2025, v. 24, n. 3, p. 383, doi. 10.13052/jwe1540-9589.2433
- Pascual Caceres, Cinthia Paola;
- Berná Martínez, José Vicente;
- Almaral Martínez, María Esther;
- Muñoz, Lucía Arnau
- Article
18
- International Review of Law, Computers & Technology, 2019, v. 33, n. 2, p. 211, doi. 10.1080/13600869.2018.1475895
- Article
19
- Government Technology, 2019, v. 32, n. 2, p. 20
- Article
20
- Personal & Ubiquitous Computing, 2018, v. 22, n. 1, p. 121, doi. 10.1007/s00779-017-1095-0
- Zhang, Jie;
- Zhou, Zhili;
- Li, Shu;
- Gan, Leilei;
- Zhang, Xuyun;
- Qi, Lianyong;
- Xu, Xiaolong;
- Dou, Wanchun
- Article
21
- Personal & Ubiquitous Computing, 2018, v. 22, n. 1, p. 93, doi. 10.1007/s00779-017-1105-2
- Leng, Lu;
- Gao, Fumeng;
- Chen, Qi;
- Kim, Cheonshik
- Article
22
- Personal & Ubiquitous Computing, 2018, v. 22, n. 1, p. 81, doi. 10.1007/s00779-017-1089-y
- Huang, Peng-Cheng;
- Chang, Chin-Chen;
- Li, Yung-Hui;
- Liu, Yanjun
- Article
23
- Personal & Ubiquitous Computing, 2017, v. 21, n. 5, p. 791, doi. 10.1007/s00779-017-1054-9
- Li, Xiong;
- Sangaiah, Arun;
- Kumari, Saru;
- Wu, Fan;
- Shen, Jian;
- Khan, Muhammad
- Article
24
- Personal & Ubiquitous Computing, 2016, v. 20, n. 4, p. 573, doi. 10.1007/s00779-016-0928-6
- Maqsood, Sana;
- Chiasson, Sonia;
- Girouard, Audrey
- Article
25
- Personal & Ubiquitous Computing, 2014, v. 18, n. 8, p. 1881, doi. 10.1007/s00779-014-0788-x
- Wang, Junyu;
- Floerkemeier, Christian;
- Sarma, Sanjay
- Article
26
- Personal & Ubiquitous Computing, 2014, v. 18, n. 1, p. 177, doi. 10.1007/s00779-012-0629-8
- Rahman, Farzana;
- Ahamed, Sheikh
- Article
27
- Personal & Ubiquitous Computing, 2014, v. 18, n. 1, p. 117, doi. 10.1007/s00779-012-0631-1
- Hoffmann, Holger;
- Söllner, Matthias
- Article
28
- Personal & Ubiquitous Computing, 2013, v. 17, n. 8, p. 1671, doi. 10.1007/s00779-012-0601-7
- Chen, Jian;
- Zhou, Xiaokang;
- Jin, Qun
- Article
29
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 875, doi. 10.1007/s00779-012-0538-x
- Fu, Zombo;
- Cao, Yuan;
- Wang, Jianxin;
- Yang, Lin
- Article
30
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 895, doi. 10.1007/s00779-012-0540-3
- Sun, Da-Zhi;
- Li, Jian-Xin;
- Feng, Zhi-Yong;
- Cao, Zhen-Fu;
- Xu, Guang-Quan
- Article
31
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 1013, doi. 10.1007/s00779-012-0548-8
- El Husseini, Anas;
- M'Hamed, Abdallah;
- El Hassan, Bachar;
- Mokhtari, Mounir
- Article
32
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 933, doi. 10.1007/s00779-012-0531-4
- Kang, Sukin;
- Kim, Jonguk;
- Hong, Manpyo
- Article
33
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 697, doi. 10.1007/s00779-011-0427-8
- Lee, Yong;
- Lee, Goo;
- Kim, Hwa;
- Jeong, Choong
- Article
34
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 677, doi. 10.1007/s00779-011-0434-9
- Han, Kyusuk;
- Mun, Hyeran;
- Shon, Taeshik;
- Yeun, Chan;
- Park, James
- Article
35
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 245, doi. 10.1007/s10009-015-0371-4
- Felderer, Michael;
- Katt, Basel
- Article
36
- Medical Principles & Practice, 2004, v. 13, n. 5, p. 290, doi. 10.1159/000079530
- Article
37
- Automation & Remote Control, 2008, v. 69, n. 7, p. 1241, doi. 10.1134/S0005117908070151
- Moldovyan, A.;
- Moldovyan, N.
- Article
38
- International Journal of Computational & Electronic Aspects in Engineering (IJCEAE), 2023, v. 4, n. 3, p. 86, doi. 10.26706/ijceae.4.3.20230905
- Chavan, Ragini;
- Muley, Jayashree
- Article
39
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 278, doi. 10.3390/jcp4020014
- Oduguwa, Tunde;
- Arabo, Abdullahi
- Article
40
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 196, doi. 10.3390/jcp4020010
- Halder, Ratna;
- Das Roy, Dipanjan;
- Shin, Dongwan
- Article
41
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 3, p. 351, doi. 10.3390/jcp3030018
- Robins, Andey;
- Olguin, Stone;
- Brown, Jarek;
- Carper, Clay;
- Borowczak, Mike
- Article
42
- Journal of Telecommunications & the Digital Economy, 2022, v. 10, n. 4, p. 72, doi. 10.18080/jtde.v10n4.564
- Abbassi, Younes;
- Toumi, Hicham;
- Ben Lahmar, El Habib
- Article
43
- 2017
- Question & Answer
44
- International Journal of Computer Information Systems & Industrial Management Applications, 2018, v. 10, p. 28
- Radzid, Amirul Ramzani;
- Azmi, Mohd Sanusi;
- Jalil, Intan Ermahani A.;
- Muda, Azah Kamilah;
- Melhem, Laith Bany;
- Arbain, Nur Atikah
- Article
45
- International Journal of Computer Information Systems & Industrial Management Applications, 2017, v. 9, p. 60
- Kazuya Nakamura;
- Kohei Kamizuru;
- Hiroshi Kawasaki;
- Satoshi Ono
- Article
46
- Advanced Electronic Materials, 2019, v. 5, n. 9, p. N.PAG, doi. 10.1002/aelm.201800872
- Pang, Yachuan;
- Gao, Bin;
- Lin, Bohan;
- Qian, He;
- Wu, Huaqiang
- Article
47
- Journal of Computing & Security, 2024, v. 11, n. 1, p. 49, doi. 10.22108/jcs.2024.137668.1129
- Tariq, Hafsa;
- Naushad, Muhammad Sajid;
- Ahmad, Tauqir
- Article
48
- Journal of Computing & Security, 2021, v. 8, n. 1, p. 19, doi. 10.22108/JCS.2021.127261.1064
- Sadeghi, Samira;
- Hadavi, Mohammad Ali
- Article
49
- Journal of Computing & Security, 2019, v. 6, n. 1, p. 13
- Article
50
- Journal of Computing & Security, 2016, v. 3, n. 4, p. 201
- Rostampour, Samad;
- Bagheri, Nasour;
- Hosseinzadeh, Mehdi;
- Khademzadeh, Ahmad
- Article