-
41
Effects of image compression on face image manipulation detection: A case study on facial retouching
Published 2021-05-01Subjects: “…biometrics (access control)…”
Get full text
Article -
42
Improving biometric recognition by means of score ratio, the likelihood ratio for non‐probabilistic classifiers. A benchmarking study
Published 2021-03-01Subjects: “…biometrics (access control)…”
Get full text
Article -
43
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01Subjects: Get full text
Article -
44
Protection of personal data under martial law in Ukraine
Published 2023-09-01Subjects: Get full text
Article -
45
Facial masks and soft‐biometrics: Leveraging face recognition CNNs for age and gender prediction on mobile ocular images
Published 2021-09-01Subjects: “…biometrics (access control)…”
Get full text
Article -
46
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01Subjects: Get full text
Article -
47
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
Published 2023-03-01Subjects: “…biometrics (access control)…”
Get full text
Article -
48
Subject independent evaluation of eyebrows as a stand‐alone biometric
Published 2021-09-01Subjects: “…biometrics (access control)…”
Get full text
Article -
49
-
50
A practical Guide to Internet Filters /
Published 1997Subjects: “…Internet Access control United States. 10496…”
View in OPAC
Book -
51
Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology
Published 2022-01-01“…Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems. …”
Get full text
Article -
52
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
Published 2020-02-01“…How to realize fine-grained access control of those data on cloud becomes an urgent problem. …”
Get full text
Article -
53
Modeling and Analyzing CSMA/CA Protocol for Energy-Harvesting Wireless Sensor Networks
Published 2015-09-01“…Well-designed wireless sensor networks (WSNs) usually provide vital support for collecting, processing, and forwarding the real-time information in mission-critical applications where medium access control (MAC) protocols determine the channel access control capabilities and the energy consumption properties of these networks. …”
Get full text
Article -
54
Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
Published 2015-01-01“…The result indicates that our nonconvex joint power allocation is equivalent to a joint MS access control and power allocation. Then, by problem relaxation and the alternating optimization approach, two suboptimal joint MS access control and power allocation algorithms are proposed. …”
Get full text
Article -
55
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Published 2014-01-01“…It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. …”
Get full text
Article -
56
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
Published 2025-01-01“…Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. …”
Get full text
Article -
57
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01“…This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. …”
Get full text
Article -
58
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
Get full text
Article -
59
Interconnection algorithm of a wide range of pervasive devices for the Internet of things
Published 2018-01-01“…The physical layer behaviors consist of what frequency is used, how and when signals are transmitted, and how transceivers’ responses are decoded. The medium access control layer behavior consists of how to provide a reliable link between two peer medium access control entities. …”
Get full text
Article -
60
Web-Based File Sharing System: A Case Study of Kabale University.
Published 2023“…The aim of this research study was to design and implement a distributed web-based file sharing and access control system that would provide users with an online storage and sharing platform and at the same time, with sufficient security means. …”
Get full text
Thesis