Works about ACCESS control
Results: 3440
An SSI-Based Solution to Support Lawful Interception.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2206, doi. 10.3390/app15042206
- By:
- Publication type:
- Article
Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 74, doi. 10.3390/fi17020074
- By:
- Publication type:
- Article
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2475, doi. 10.32604/cmc.2025.058963
- By:
- Publication type:
- Article
DS-GAC: A Data-Sharing Scheme Based on Group Attribute Characteristics.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 702, doi. 10.3390/electronics14040702
- By:
- Publication type:
- Article
Security System Design and Verification for Zero Trust Architecture.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 643, doi. 10.3390/electronics14040643
- By:
- Publication type:
- Article
Comparative Analysis of Hash Functions in Blockchain for Implementation of Blockchain on a Resource-Constrained System.
- Published in:
- International Journal of Performability Engineering, 2025, v. 21, n. 2, p. 84, doi. 10.23940/ijpe.25.02.p3.8493
- By:
- Publication type:
- Article
Student Apartment Access Control System Based on MTCNN-FaceNet Algorithm.
- Published in:
- International Journal of Computational Intelligence & Applications, 2025, v. 24, n. 1, p. 1, doi. 10.1142/S1469026824500226
- By:
- Publication type:
- Article
A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis.
- Published in:
- Information Systems Frontiers, 2024, v. 26, n. 6, p. 2255, doi. 10.1007/s10796-021-10167-z
- By:
- Publication type:
- Article
Hybrid Dynamic Galois Field with Quantum Resilience for Secure IoT Data Management and Transmission in Smart Cities Using Reed–Solomon (RS) Code.
- Published in:
- Symmetry (20738994), 2025, v. 17, n. 2, p. 259, doi. 10.3390/sym17020259
- By:
- Publication type:
- Article
MILD: Minimizing Idle Listening Energy Consumption via Down-Clocking for Energy-Efficient Wi-Fi Communications †.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1155, doi. 10.3390/s25041155
- By:
- Publication type:
- Article
Discretionary Access Controls for a Collaborative Virtual Environment.
- Published in:
- International Journal of Virtual Reality, 2010, v. 9, n. 1, p. 61, doi. 10.20870/ijvr.2010.9.1.2763
- By:
- Publication type:
- Article
We need at least two baskets for our eggs: PDF alone is not enough for e-publication.
- Published in:
- Taxon, 2014, v. 63, n. 1, p. 134, doi. 10.12705/631.8
- By:
- Publication type:
- Article
Modeling and enforcing access control policies in conversational user interfaces.
- Published in:
- Software & Systems Modeling, 2023, v. 22, n. 6, p. 1925, doi. 10.1007/s10270-023-01131-3
- By:
- Publication type:
- Article
Guest editorial for EMMSAD'2022 special section.
- Published in:
- 2023
- By:
- Publication type:
- Editorial
Controllable and decomposable multidirectional synchronizations.
- Published in:
- Software & Systems Modeling, 2021, v. 20, n. 5, p. 1735, doi. 10.1007/s10270-021-00879-w
- By:
- Publication type:
- Article
Correction to: Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations.
- Published in:
- 2019
- By:
- Publication type:
- Correction Notice
Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations.
- Published in:
- Software & Systems Modeling, 2019, v. 18, n. 3, p. 1737, doi. 10.1007/s10270-017-0631-8
- By:
- Publication type:
- Article
Least privilege analysis in software architectures.
- Published in:
- Software & Systems Modeling, 2013, v. 12, n. 2, p. 331, doi. 10.1007/s10270-011-0218-8
- By:
- Publication type:
- Article
Hydrogen Source Tuned Regiodivergent Asymmetric Hydroalkylations of 2‐Substituted 1,3‐Dienes with Aldehydes by Cobalt‐Catalysis.
- Published in:
- Angewandte Chemie, 2024, v. 136, n. 23, p. 1, doi. 10.1002/ange.202403073
- By:
- Publication type:
- Article
Complementary Syntheses Giving Access to a Full Suite of Differentially Substituted Phthalocyanine‐Porphyrin Hybrids.
- Published in:
- Angewandte Chemie, 2021, v. 133, n. 14, p. 7710, doi. 10.1002/ange.202016596
- By:
- Publication type:
- Article
A multi-phase scalable, communication reliable, and energy efficient MAC (SRE-MAC) protocol for WBAN.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 39, p. 86479, doi. 10.1007/s11042-024-19512-1
- By:
- Publication type:
- Article
Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 78827, doi. 10.1007/s11042-024-18626-w
- By:
- Publication type:
- Article
A hybrid boosted neural sensitive attribute detection machine learning algorithm for HABAC systems.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 25, p. 66343, doi. 10.1007/s11042-024-18215-x
- By:
- Publication type:
- Article
FRIH: A face recognition framework using image hashing.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 60147, doi. 10.1007/s11042-023-18007-9
- By:
- Publication type:
- Article
A blockchain-based system for patient data privacy and security.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 60443, doi. 10.1007/s11042-023-17941-y
- By:
- Publication type:
- Article
Blockchain based authentication and access control protocol for IoT.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 51731, doi. 10.1007/s11042-023-17607-9
- By:
- Publication type:
- Article
Digital forensic framework for smart contract vulnerabilities using ensemble models.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 51469, doi. 10.1007/s11042-023-17308-3
- By:
- Publication type:
- Article
A 3-factor authentication access control system using RFID, fingerprint, token and code.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 43635, doi. 10.1007/s11042-023-17325-2
- By:
- Publication type:
- Article
Secure monitoring model for smart agriculture using an optimized attribute-based access control centralized authority system.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 44781, doi. 10.1007/s11042-023-17052-8
- By:
- Publication type:
- Article
Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 30, p. 46577, doi. 10.1007/s11042-023-15586-5
- By:
- Publication type:
- Article
A deep learning approach for text-independent speaker recognition with short utterances.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 21, p. 33111, doi. 10.1007/s11042-023-14942-9
- By:
- Publication type:
- Article
Construction of system friendly attribute based fully distributed access control architecture for e-healthcare.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 26937, doi. 10.1007/s11042-023-14836-w
- By:
- Publication type:
- Article
Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 22251, doi. 10.1007/s11042-022-13537-0
- By:
- Publication type:
- Article
ANFIS for risk estimation in risk-based access control model for smart homes.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 12, p. 18269, doi. 10.1007/s11042-022-14010-8
- By:
- Publication type:
- Article
Blockchain-based medical health record access control scheme with efficient protection mechanism and patient control.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16279, doi. 10.1007/s11042-022-14023-3
- By:
- Publication type:
- Article
A compact periocular recognition system based on deep learning framework AttenMidNet with the attention mechanism.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 10, p. 15837, doi. 10.1007/s11042-022-14017-1
- By:
- Publication type:
- Article
Secured blind digital certificate and Lamport Merkle cloud assisted medical image sharing using blockchain.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 6, p. 9323, doi. 10.1007/s11042-022-13719-w
- By:
- Publication type:
- Article
Continuous user authentication on smartphone via behavioral biometrics: a survey.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 2, p. 1633, doi. 10.1007/s11042-022-13245-9
- By:
- Publication type:
- Article
Review on mobility aware MAC protocol using Mobile internet of things.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 27, p. 38705, doi. 10.1007/s11042-022-13131-4
- By:
- Publication type:
- Article
A new occluded face recognition framework with combination of both Deocclusion and feature filtering methods.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 23, p. 33867, doi. 10.1007/s11042-022-12851-x
- By:
- Publication type:
- Article
A new occluded face recognition framework with combination of both Deocclusion and feature filtering methods.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 22, p. 33867, doi. 10.1007/s11042-022-12851-x
- By:
- Publication type:
- Article
STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 21, p. 30069, doi. 10.1007/s11042-022-12805-3
- By:
- Publication type:
- Article
A novel logistics data privacy protection method based on blockchain.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 17, p. 23867, doi. 10.1007/s11042-022-12836-w
- By:
- Publication type:
- Article
A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 15, p. 21417, doi. 10.1007/s11042-022-12550-7
- By:
- Publication type:
- Article
Efficient access control with traceability and user revocation in IoT.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 31487, doi. 10.1007/s11042-021-11286-0
- By:
- Publication type:
- Article
A blockchain-based platform architecture for multimedia data management.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30707, doi. 10.1007/s11042-021-10558-z
- By:
- Publication type:
- Article
A new blockchain-based personal privacy protection scheme.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30677, doi. 10.1007/s11042-020-09867-6
- By:
- Publication type:
- Article
Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30605, doi. 10.1007/s11042-020-09322-6
- By:
- Publication type:
- Article
Blockchain-based multimedia content distribution with the assured system update mechanism.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 19, p. 29423, doi. 10.1007/s11042-021-10948-3
- By:
- Publication type:
- Article
Analysis of a Multiple Dual-Stage Vacation Queueing System with Disaster and Repairable Server.
- Published in:
- Methodology & Computing in Applied Probability, 2022, v. 24, n. 4, p. 2485, doi. 10.1007/s11009-022-09926-5
- By:
- Publication type:
- Article