Search

Your search keyword '"COMPUTER access control"' showing total 1,674 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER access control" Remove constraint Descriptor: "COMPUTER access control" Topic computer science Remove constraint Topic: computer science
1,674 results on '"COMPUTER access control"'

Search Results

1. Light Weight Authentication Scheme for Smart Home IoT Devices.

2. Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol.

3. ARE YOU WHO YOU SAY YOU ARE? COMPUTER SCIENCE AND THE PROBLEM OF DIVINE SELF‐AUTHENTICATION.

4. Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.

5. Fenix: A Pan-European Federation of Supercomputing and Cloud e-Infrastructure Services.

6. Passwords and the Evolution of Imperfect Authentication.

7. Secure authentication in the grid: A formal analysis of DNP3 SAv5.

8. Revocable and Non-Invertible Multibiometric Template Protection based on Matrix Transformation.

9. Spatial Connector: Mapping Access Control Models for Pervasive Computing and Cloud Computing.

10. iCETD: An improved tag generation design for memory data authentication in embedded processor systems.

11. TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

12. Authentication in virtual private networks based on quantum key distribution methods.

13. Window-LRFU: a cache replacement policy subsumes the LRU and window-LFU policies.

14. Αυθεντικοποίηση με χρήση οπτικής πληροφορίας και διαχείριση πρόσβασης με δυναμικές παραμέτρους σε πληροφοριακά συστήματα

15. Vulnerability in Information Technology and Computing- A Study in Technological Information Assurance

16. AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge

17. A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie-Hellman with privacy preserving public key infrastructure.

18. Recycled IC Detection Based on Statistical Methods.

19. Reevaluating Data Stall Time with the Consideration of Data Access Concurrency.

20. A Logic-Based Authorization Framework and Implementation.

22. ATTRIBUTE ANALYSIS OF USAGE CONTROL (UCON).

23. Authenticating Location-Based Skyline Queries in Arbitrary Subspaces.

24. Incorporating behavioral trust theory into system development for ubiquitous applications.

25. ICF Inspired Personas to Improve Development for Usability and Accessibility in Ambient Assisted Living.

26. A Rhythm-Based Authentication Scheme for Smart Media Devices.

27. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks.

28. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world

29. AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks

30. Fine-Grained Access Control via Policy-Carrying Data

31. Multi-user permission strategy to access sensitive information

32. ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations

33. Keystroke dynamics in the pre-touchscreen era.

34. Lightweight key management on sensitive data in the cloud.

35. Provably secure revocable ID-based signature in the standard model.

36. Sybil Attack Detection and Prevention Using AODV in VANET.

37. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices.

38. System Event Monitoring for Active Authentication.

39. An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks.

40. Escrowable identity-based authenticated key agreement protocol with strong security.

41. G-Profile: A Hybrid Solution for Extended Identity Management in the Field of Personalized Service Provision.

42. On Protection by Layout Randomization.

43. Research on Separation of Three Powers Architecture for Trusted OS.

44. A Review of Grid Authentication and Authorization Technologies and Support for Federated Access Control.

45. Attribute based access control scheme with controlled access delegation for collaborative E-health environments

46. EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud

47. SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing

48. OrBAC from access control model to access usage model

49. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

50. A study on secure user authentication and authorization in OAuth protocol

Catalog

Books, media, physical & digital resources