Search

Your search keyword '"ACCESS control of computer networks"' showing total 1,090 results

Search Constraints

Start Over You searched for: Descriptor "ACCESS control of computer networks" Remove constraint Descriptor: "ACCESS control of computer networks"
1,090 results on '"ACCESS control of computer networks"'

Search Results

1. Improving Accuracy and Security of Identification by Multimodal Biometric Fusion: An Extensive Analysis.

2. Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment.

3. The SCION Internet Architecture.

4. Correction: Priority Based Energy Efficient MAC Protocol by Varying Data Rate For Wireless Body Area Network.

5. Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking.

6. Internal Access Controls.

7. Prioritization key to prep for website accessibility rule.

8. Pinning synchronization of complex delayed dynamical networks via generalized intermittent adaptive control strategy.

9. New Approaches to Security and Availability for Cloud Data.

10. Cluster synchronization for a class of complex dynamical network system with randomly occurring coupling delays via an improved event-triggered pinning control approach.

11. OpenFlow: A Radical New Idea in Networking.

12. Pinning event-triggered control for stochastic discrete-time complex networks with timevarying delay.

13. Out Lag Synchronization of Fractional Order Delayed Complex Networks with Coupling Delay via Pinning Control.

14. Decentralised Functional Signatures.

15. Synchronisation for complex dynamical networks with hybrid coupling time-varying delays via pinning adaptive control.

16. Priority-Oriented Route Network Planning for Evacuation in Constrained Space Scenarios.

17. BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET.

18. Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks.

19. Implementation and Application of ACL in Campus Network.

20. An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks.

21. Multichannel MAC Scheme to Deliver Real-Time Safety Packets in Dense VANET.

22. An Empirical study on MAC layer in IEEE 802.11p/WAVE based Vehicular Ad hoc Networks.

23. Energy Consumption Reduction in S-MAC Protocol for Wireless Sensor Network.

24. An analysis on the revoking mechanisms for JSONWeb Tokens.

25. A Framework for the Automation of LTE Physical Layer Tests.

26. An Energy-Efficient and Collision-Avoidance MAC Protocol with Pre-scheduling for Wireless Sensor Networks.

27. A based on blinded CP-ABE searchable encryption cloud storage service scheme.

28. Auction-Stackelberg game framework for access permission in femtocell networks with multiple network operators.

29. Range extension cooperative MAC to attack energy hole in duty-cycled multi-hop WSNs.

30. Pan European Phenological database (PEP725): a single point of access for European data.

31. ACMHS: Efficient access control for mobile health care system.

32. Performance Evaluation of MANET Using Multi-Channel MAC Framework.

33. SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation.

34. Enforcing authorizations while protecting access confidentiality.

35. Access control in IoT environments: Feasible scenarios.

36. A physical access control system on the cloud.

37. LoRa technology MAC layer operations and Research issues.

38. Emergency Traffic MAC Protocols in Wireless Body Area Networks.

39. Hybrid computation offloading for smart home automation in mobile cloud computing.

40. An effective approach to solving large communication overhead issue and strengthening the securities of AKA protocols.

41. Modeling and performance analysis of a new secure address resolution protocol.

42. Mining hierarchical temporal roles with multiple metrics.

43. Network dimensioning and base station on/off switching strategies for sustainable deployments in remote areas.

44. Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things.

46. how SOFTWARE DEFINED NETWORKING SDN raised one district's IT response.

47. Creating Efficient Broadband Converged Indoor Networks using POF Technologies.

48. A lightweight password-based authentication protocol using smart card.

49. Cross stratum resources protection in fog-computing-based radio over fiber networks for 5G services.

50. Prediction of the impact of network switch utilization on application performance via active measurement.

Catalog

Books, media, physical & digital resources