Skip to search formSkip to main contentSkip to account menu

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
In this paper, we proposed a novel approach for establishing person identity based on gait cues in surveillance videos using… 
Highly Cited
2010
Highly Cited
2010
sequential cooperative spectrum sensing algorithm is developed for multi-channel cognitive radio (CR) systems. Each CR quantizes… 
Highly Cited
2007
Highly Cited
2007
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of… 
Highly Cited
2006
Highly Cited
2006
This article addresses the quality of service provisioning issues in the wireless mesh backbone for broadband wireless access… 
Highly Cited
2005
Highly Cited
2005
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless… 
Highly Cited
2000
Highly Cited
2000
This paper identifies the issues in resource management and scheduling in the emerging grid computing context and briefly… 
Highly Cited
1998
Highly Cited
1998
Fairness algorithms and access methods enable non-zero channel access for wireless communication systems operating in a random…