Works matching Computer access control
2
- South African Journal of Information Management, 2015, v. 17, n. 1, p. 1, doi. 10.4102/sajim.v17i1.638
- Butler, Rika;
- Butler, Martin
- Article
3
- Egyptian Computer Science Journal, 2013, v. 37, n. 5, p. 16
- Haider, Adel Sallam M.;
- Arasi, Munya Abdulmajid
- Article
4
- Business Consultant / Poslovni Konsultant, 2020, v. 12, n. 99, p. 76
- Lazović, Gordana;
- Hodžic, Nedžad
- Article
5
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 5, p. 243, doi. 10.1080/19393555.2012.694978
- Shankar, T.N.;
- Sahoo, G.;
- Niranjan, S.
- Article
6
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 2, p. 292
- Santra, A. K.;
- Nagarajan, S.
- Article
7
- Entropy, 2018, v. 20, n. 5, p. 319, doi. 10.3390/e20050319
- Benito Peral, Alberto;
- Sandoval Orozco, Ana Lucila;
- García Villalba, Luis Javier;
- Tai-Hoon Kim
- Article
8
- New Perspectives on Healthcare Risk Management, Control & Governance, 2015, v. 34, n. 1, p. 28
- Article
10
- Strategic Finance, 2004, v. 86, n. 2, p. 53
- Article
11
- Computer Journal, 2016, v. 59, n. 4, p. 462, doi. 10.1093/comjnl/bxv060
- VELOUDIS, SIMEON;
- NISSANKE, NIMAL
- Article
12
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1419
- Sreedevi, M.;
- Seshadri, R.
- Article
13
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2323, doi. 10.1002/sec.1494
- Sánchez-Carmona, Adrián;
- Robles, Sergi;
- Borrego, Carlos
- Article
14
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3219, doi. 10.1002/sec.1246
- Lu, Yanrong;
- Li, Lixiang;
- Peng, Haipeng;
- Yang, Yixian
- Article
15
- Security & Communication Networks, 2015, v. 8, n. 5, p. 740, doi. 10.1002/sec.1021
- Baek, Joonsang;
- Byon, Young-ji;
- Hableel, Eman;
- Al-Qutayri, Mahmoud
- Article
16
- Wireless Personal Communications, 2016, v. 90, n. 1, p. 175, doi. 10.1007/s11277-016-3338-1
- Article
17
- Computers, Materials & Continua, 2025, v. 84, n. 3, p. 4019, doi. 10.32604/cmc.2025.066139
- Zineddine, Abdelhadi;
- Belfaik, Yousra;
- Rehaimi, Abdeslam;
- Sadqi, Yassine;
- Safi, Said
- Article
18
- Security & Communication Networks, 2025, v. 2025, p. 1, doi. 10.1155/sec/5813881
- Yeboah, Donald;
- Addo, Prince Clement;
- Dagadu, Joshua Caleb;
- Appiah, Michael;
- Conti, Vincenzo
- Article
19
- Journal of Intelligent Systems & Internet of Things, 2026, v. 18, n. 1, p. 80, doi. 10.54216/JISIoT.180106
- Ibrahim, Rasha Khalid;
- Hoobi, Mays M.
- Article
20
- Computer Journal, 2025, v. 68, n. 7, p. 717, doi. 10.1093/comjnl/bxae144
- Al-Naffakh, N;
- Clarke, N;
- Li, F;
- Haskell-Dowland, P
- Article
21
- Wireless Networks (10220038), 2025, v. 31, n. 6, p. 4087, doi. 10.1007/s11276-025-03980-w
- Wang, Ziwen;
- Guo, Yajun;
- Guo, Yimin
- Article
22
- University of Chicago Law Review, 2020, v. 87, n. 5, p. 1437
- Article
23
- Journal of Information Science & Engineering, 2019, v. 35, n. 2, p. 341, doi. 10.6688/JISE.201903_35(2).0006
- LING XIONG;
- TU PENG;
- DAI-YUAN PENG;
- HONG-BIN LIANG;
- ZHI-CAI LIU
- Article
24
- Journal of Information Science & Engineering, 2018, v. 34, n. 2, p. 371, doi. 10.6688/JISE.2018.34.2.4
- CHIEN-MING CHEN;
- WEICHENG FANG;
- SHUAI LIU;
- TSU-YANG WU;
- JENG-SHYANG PAN;
- KING-HANG WANG
- Article
25
- Journal of Information Science & Engineering, 2018, v. 34, n. 1, p. 155, doi. 10.6688/JISE.2018.34.1.10
- CHUN-TA LI;
- CHENG-CHI LEE;
- CHI-YAO WENG
- Article
26
- Journal of Information Science & Engineering, 2016, v. 32, n. 6, p. 1455
- NURMAMAT HELIL;
- RAHMAN, KAYSAR
- Article
27
- Journal of Information Science & Engineering, 2016, v. 32, n. 5, p. 1131
- DONGHAI TIAN;
- JUNHUA CHEN;
- CHANGZHEN HU;
- JINGFENG XUE
- Article
28
- Journal of Information Science & Engineering, 2016, v. 32, n. 2, p. 389
- MIN ZHANG;
- JIA-SHU ZHANG;
- WEN-RONG TAN
- Article
29
- Journal of Information Science & Engineering, 2015, v. 31, n. 4, p. 1199
- Article
30
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 727
- KUO-YANG WU;
- KUO-YU TSAI;
- TZONG-CHEN WU;
- KOUICHI SAKURAI
- Article
31
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 343
- Article
32
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 247
- SADIKIN RIFKI;
- YOUNGHO PARK;
- SANGJAE MOON
- Article
33
- Journal of Information Science & Engineering, 2013, v. 29, n. 3, p. 417
- YU-CHENG HSIAO;
- GWAN-HWAN HWANG
- Article
34
- Journal of Information Science & Engineering, 2013, v. 29, n. 2, p. 249
- HUNG-YU CHIEN;
- TZONG-CHEN WU;
- MING-KUEI YEW
- Article
35
- Journal of Information Science & Engineering, 2009, v. 25, n. 4, p. 1177
- SUNGJU LEE;
- DAESUNG MOON;
- YONGWHA CHUNG
- Article
36
- ASHRAE Journal, 2008, v. 50, n. 11, p. B37
- McLauchlan, Donald J.;
- Dutt, Brian
- Article
37
- ASHRAE Journal, 2008, v. 50, n. 11, p. B30
- Article
38
- ASHRAE Journal, 2006, v. 48, n. 11, p. B10
- Holmberg, David C.;
- Bender, Joel;
- Galler, Mike
- Article
39
- Public Relations Tactics, 2011, v. 18, n. 1, p. 3
- Article
40
- Medical & Biological Engineering & Computing, 2014, v. 52, n. 5, p. 449, doi. 10.1007/s11517-014-1147-9
- Yu, Yao-Chang;
- Hou, Ting-Wei
- Article
41
- Universal Access in the Information Society, 2008, v. 7, n. 1/2, p. 103, doi. 10.1007/s10209-007-0106-8
- Arrue, Myriam;
- Vigo, Markel;
- Abascal, Julio
- Article
42
- Universal Access in the Information Society, 2004, v. 3, n. 3/4, p. 252, doi. 10.1007/s10209-004-0105-y
- Article
43
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 245, doi. 10.1007/s10009-015-0371-4
- Felderer, Michael;
- Katt, Basel
- Article
44
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 3, p. 351, doi. 10.3390/jcp3030018
- Robins, Andey;
- Olguin, Stone;
- Brown, Jarek;
- Carper, Clay;
- Borowczak, Mike
- Article
45
- International Journal of Multidisciplinary: Applied Business & Education Research, 2025, v. 6, n. 4, p. 1947, doi. 10.11594/ijmaber.06.04.27
- Juliano, Joseph J.;
- Armada, Marc Kiane A.;
- Portugues Cosadio Jr., Angelito N.;
- F. Reyes, Rickron E. Francis
- Article
46
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 17, p. 2319, doi. 10.1049/iet-com.2016.0480
- Ilsun You;
- Jae Deok Lim;
- Jeong Nyeo Kim;
- Hyobeom Ahn;
- Chang Choi
- Article
47
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 17, p. 2308, doi. 10.1049/iet-com.2016.0331
- Article
48
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 8, p. 987, doi. 10.1049/iet-com.2016.0046
- Alhumaima, Raad S.;
- Al-Raweshidy, Hamed S.
- Article
49
- Journal of Telecommunications & the Digital Economy, 2022, v. 10, n. 4, p. 72, doi. 10.18080/jtde.v10n4.564
- Abbassi, Younes;
- Toumi, Hicham;
- Ben Lahmar, El Habib
- Article
50
- 2017
- Question & Answer