Works matching DE "COMPUTER access control"
1
- Journal of Web Engineering, 2025, v. 24, n. 3, p. 383, doi. 10.13052/jwe1540-9589.2433
- Pascual Caceres, Cinthia Paola;
- Berná Martínez, José Vicente;
- Almaral Martínez, María Esther;
- Muñoz, Lucía Arnau
- Article
2
- International Review of Law, Computers & Technology, 2019, v. 33, n. 2, p. 211, doi. 10.1080/13600869.2018.1475895
- Article
3
- Government Technology, 2019, v. 32, n. 2, p. 20
- Article
4
- Personal & Ubiquitous Computing, 2018, v. 22, n. 1, p. 93, doi. 10.1007/s00779-017-1105-2
- Leng, Lu;
- Gao, Fumeng;
- Chen, Qi;
- Kim, Cheonshik
- Article
5
- Personal & Ubiquitous Computing, 2018, v. 22, n. 1, p. 81, doi. 10.1007/s00779-017-1089-y
- Huang, Peng-Cheng;
- Chang, Chin-Chen;
- Li, Yung-Hui;
- Liu, Yanjun
- Article
6
- Personal & Ubiquitous Computing, 2017, v. 21, n. 5, p. 791, doi. 10.1007/s00779-017-1054-9
- Li, Xiong;
- Sangaiah, Arun;
- Kumari, Saru;
- Wu, Fan;
- Shen, Jian;
- Khan, Muhammad
- Article
7
- Personal & Ubiquitous Computing, 2016, v. 20, n. 4, p. 573, doi. 10.1007/s00779-016-0928-6
- Maqsood, Sana;
- Chiasson, Sonia;
- Girouard, Audrey
- Article
8
- Personal & Ubiquitous Computing, 2014, v. 18, n. 8, p. 1881, doi. 10.1007/s00779-014-0788-x
- Wang, Junyu;
- Floerkemeier, Christian;
- Sarma, Sanjay
- Article
9
- Personal & Ubiquitous Computing, 2014, v. 18, n. 1, p. 177, doi. 10.1007/s00779-012-0629-8
- Rahman, Farzana;
- Ahamed, Sheikh
- Article
10
- Personal & Ubiquitous Computing, 2014, v. 18, n. 1, p. 117, doi. 10.1007/s00779-012-0631-1
- Hoffmann, Holger;
- Söllner, Matthias
- Article
11
- Personal & Ubiquitous Computing, 2013, v. 17, n. 8, p. 1671, doi. 10.1007/s00779-012-0601-7
- Chen, Jian;
- Zhou, Xiaokang;
- Jin, Qun
- Article
12
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 875, doi. 10.1007/s00779-012-0538-x
- Fu, Zombo;
- Cao, Yuan;
- Wang, Jianxin;
- Yang, Lin
- Article
13
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 895, doi. 10.1007/s00779-012-0540-3
- Sun, Da-Zhi;
- Li, Jian-Xin;
- Feng, Zhi-Yong;
- Cao, Zhen-Fu;
- Xu, Guang-Quan
- Article
14
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 1013, doi. 10.1007/s00779-012-0548-8
- El Husseini, Anas;
- M'Hamed, Abdallah;
- El Hassan, Bachar;
- Mokhtari, Mounir
- Article
15
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 933, doi. 10.1007/s00779-012-0531-4
- Kang, Sukin;
- Kim, Jonguk;
- Hong, Manpyo
- Article
16
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 697, doi. 10.1007/s00779-011-0427-8
- Lee, Yong;
- Lee, Goo;
- Kim, Hwa;
- Jeong, Choong
- Article
17
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 677, doi. 10.1007/s00779-011-0434-9
- Han, Kyusuk;
- Mun, Hyeran;
- Shon, Taeshik;
- Yeun, Chan;
- Park, James
- Article
18
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 245, doi. 10.1007/s10009-015-0371-4
- Felderer, Michael;
- Katt, Basel
- Article
19
- Medical Principles & Practice, 2004, v. 13, n. 5, p. 290, doi. 10.1159/000079530
- Article
20
- Automation & Remote Control, 2008, v. 69, n. 7, p. 1241, doi. 10.1134/S0005117908070151
- Moldovyan, A.;
- Moldovyan, N.
- Article
21
- International Journal of Computational & Electronic Aspects in Engineering (IJCEAE), 2023, v. 4, n. 3, p. 86, doi. 10.26706/ijceae.4.3.20230905
- Chavan, Ragini;
- Muley, Jayashree
- Article
22
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 278, doi. 10.3390/jcp4020014
- Oduguwa, Tunde;
- Arabo, Abdullahi
- Article
23
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 196, doi. 10.3390/jcp4020010
- Halder, Ratna;
- Das Roy, Dipanjan;
- Shin, Dongwan
- Article
24
- Journal of Cybersecurity & Privacy, 2023, v. 3, n. 3, p. 351, doi. 10.3390/jcp3030018
- Robins, Andey;
- Olguin, Stone;
- Brown, Jarek;
- Carper, Clay;
- Borowczak, Mike
- Article
25
- Journal of Telecommunications & the Digital Economy, 2022, v. 10, n. 4, p. 72, doi. 10.18080/jtde.v10n4.564
- Abbassi, Younes;
- Toumi, Hicham;
- Ben Lahmar, El Habib
- Article
26
- International Journal of Computer Information Systems & Industrial Management Applications, 2018, v. 10, p. 28
- Radzid, Amirul Ramzani;
- Azmi, Mohd Sanusi;
- Jalil, Intan Ermahani A.;
- Muda, Azah Kamilah;
- Melhem, Laith Bany;
- Arbain, Nur Atikah
- Article
27
- International Journal of Computer Information Systems & Industrial Management Applications, 2017, v. 9, p. 60
- Kazuya Nakamura;
- Kohei Kamizuru;
- Hiroshi Kawasaki;
- Satoshi Ono
- Article
28
- Advanced Electronic Materials, 2019, v. 5, n. 9, p. N.PAG, doi. 10.1002/aelm.201800872
- Pang, Yachuan;
- Gao, Bin;
- Lin, Bohan;
- Qian, He;
- Wu, Huaqiang
- Article
29
- Journal of Computing & Security, 2024, v. 11, n. 1, p. 49, doi. 10.22108/jcs.2024.137668.1129
- Tariq, Hafsa;
- Naushad, Muhammad Sajid;
- Ahmad, Tauqir
- Article
30
- Journal of Computing & Security, 2021, v. 8, n. 1, p. 19, doi. 10.22108/JCS.2021.127261.1064
- Sadeghi, Samira;
- Hadavi, Mohammad Ali
- Article
31
- Journal of Computing & Security, 2019, v. 6, n. 1, p. 13
- Article
32
- Journal of Computing & Security, 2016, v. 3, n. 4, p. 201
- Rostampour, Samad;
- Bagheri, Nasour;
- Hosseinzadeh, Mehdi;
- Khademzadeh, Ahmad
- Article
33
- Journal of Computing & Security, 2016, v. 3, n. 3, p. 163
- Moradi, Fereidoun;
- Mala, Hamid;
- Ladani, Behrouz Tork;
- Moradi, Fariba
- Article
34
- Advances in Systems Science & Applications, 2024, v. 24, n. 1, p. 142
- Thabit, Rasha;
- Fadhil, Heba Mohammed;
- Fakhruldeen, Hassan Falah;
- Shather, Akram Hatem;
- Al-Askari, Mohanad A.
- Article
35
- International Journal of Intelligent Computing & Information Sciences, 2023, v. 23, n. 4, p. 96, doi. 10.21608/ijicis.2023.254505.1309
- Omara, Mahmoud;
- Khalid, H.;
- Fayez, Mahmoud;
- Ghoniemy, Said
- Article
36
- Journal of Network & Information Security, 2018, v. 6, n. 2, p. 24
- Article
37
- Journal of Applied Information Science, 2017, v. 5, n. 1, p. 42
- Poorvadevi, R.;
- Rajalakshmi, S.
- Article
38
- International Journal of Distributed & Cloud Computing, 2020, v. 8, n. 1/2, p. 9
- Article
39
- Traitement du Signal, 2025, v. 42, n. 2, p. 1123, doi. 10.18280/ts.420243
- Article
40
- Document News, 2012, v. 30, n. 5/6, p. 11
- Article
41
- Business Informatics / Informatyka Ekonomiczna, 2016, v. 2, n. 40, p. 25, doi. 10.15611/ie.2016.2.02
- Kutera, Robert;
- Gryncewicz, Wiesława
- Article
42
- Journal of Information Technology & Applications, 2013, v. 3, n. 1, p. 27, doi. 10.7251/JIT1301027M
- Milenković, Ivan;
- Latinović, Olja;
- Simić, Dejan
- Article
43
- Discrete & Continuous Dynamical Systems - Series S, 2015, v. 8, n. 6, p. 1301, doi. 10.3934/dcdss.2015.8.1301
- SHUAI REN;
- TAO ZHANG;
- FANGXIA SHI;
- ZONGZONG LOU
- Article
44
- Advances in Mathematics of Communications, 2015, v. 9, n. 4, p. 471, doi. 10.3934/amc.2015.9.471
- DOUSTI, MOHAMMAD SADEQ;
- JALILI, RASOOL
- Article
45
- Design Issues, 2008, v. 24, n. 3, p. 4, doi. 10.1162/desi.2008.24.3.4
- Article
46
- Computer und Recht, 2019, v. 35, n. 6, p. r68, doi. 10.9785/cr-2019-350625
- Article
47
- Transactions of the Institute of Measurement & Control, 2015, v. 37, n. 10, p. 1197, doi. 10.1177/0142331214558680
- Article
48
- BMS: Bulletin de Methodologie Sociologique (Sage Publications Ltd.), 2017, v. 134, n. 1, p. 77, doi. 10.1177/0759106317693796
- Article
49
- IUP Journal of Telecommunications, 2019, v. 11, n. 3, p. 26
- Bokade, Gayatri U.;
- Kanphade, Rajendra D.
- Article
50
- Acta Technica Corviniensis - Bulletin of Engineering, 2015, v. 8, n. 2, p. 27
- SARKAR, Tanmoy;
- SANYAL, Sugata
- Article