Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,756 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Sequential cooperative sensing for multi-channel cognitive radios
Seung-Jun Kim
,
G. Giannakis
IEEE International Conference on Acoustics…
2010
Corpus ID: 10432893
sequential cooperative spectrum sensing algorithm is developed for multi-channel cognitive radio (CR) systems. Each CR quantizes…
Expand
Highly Cited
2008
Highly Cited
2008
Quorum-Based Energy Saving MAC Protocol Design for Wireless Sensor Networks
C. Chao
,
Yi-Wei Lee
IEEE/IFIP International Conference on Embedded…
2008
Corpus ID: 5611631
Wireless sensor networks are mainly designed for environment surveillance where wireless sensor nodes cooperate to get their job…
Expand
Highly Cited
2007
Highly Cited
2007
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Tingjian Ge
,
S. Zdonik
IEEE International Conference on Data Engineering
2007
Corpus ID: 181019
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of…
Expand
Highly Cited
2007
Highly Cited
2007
Selective Data Encryption in Outsourced Dynamic Environments
E. Damiani
,
S. Vimercati
,
S. Foresti
,
S. Jajodia
,
S. Paraboschi
,
P. Samarati
VODCA@FOSAD
2007
Corpus ID: 497093
Highly Cited
2005
Highly Cited
2005
Performance of ad hoc routing using directional antennas
Romit Roy Choudhury
,
N. Vaidya
Ad hoc networks
2005
Corpus ID: 16264009
Highly Cited
2005
Highly Cited
2005
On the Correctness of Operating System Kernels
M. Gargano
,
Mark A. Hillebrand
,
Dirk Leinenbach
,
W. Paul
International Conference on Theorem Proving in…
2005
Corpus ID: 13100398
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless…
Expand
Highly Cited
2005
Highly Cited
2005
Towards multi-purpose wireless sensor networks
J. Steffan
,
Ludger Fiege
,
Mariano Cilia
,
A. Buchmann
Systems Communications
2005
Corpus ID: 14937753
Current wireless sensor network (WSN) architectures are based on the assumption that all sensor nodes are participating in a…
Expand
Highly Cited
2002
Highly Cited
2002
Bluetooth and IEEE 802.11 coexistence: analytical performance evaluation in fading channel
A. Conti
,
D. Dardari
,
G. Pasolini
,
O. Andrisano
IEEE International Symposium on Personal, Indoor…
2002
Corpus ID: 7751042
The performance in terms of the mean packet error probability (PEP) in a Rayleigh fading channel with thermal noise is…
Expand
Highly Cited
1998
Highly Cited
1998
Balanced media access methods for wireless networks
Timucin Ozugura
,
Mahmoud Naghshinehb
,
Parviz Kermanib
,
Michael Olsen
,
Babak Rezvanib
,
J. Copeland
ACM/IEEE International Conference on Mobile…
1998
Corpus ID: 994057
Fairness algorithms and access methods enable non-zero channel access for wireless communication systems operating in a random…
Expand
Highly Cited
1983
Highly Cited
1983
NIL: An integrated language and system for distributed programming
R. Strom
,
S. Yemini
SIGPLAN Conferences and Workshops
1983
Corpus ID: 16064742
This paper presents features of the NIL programming language which support the construction of distributed software systems: (1…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE