Skip to search formSkip to main contentSkip to account menu

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
In cognitive radio networks (CRNs), perfect knowledge of a dynamic radio environment is hard to know due to hardware limitation… 
Highly Cited
2010
Highly Cited
2010
sequential cooperative spectrum sensing algorithm is developed for multi-channel cognitive radio (CR) systems. Each CR quantizes… 
Highly Cited
2007
Highly Cited
2007
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of… 
Highly Cited
2005
Highly Cited
2005
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless… 
Highly Cited
2004
Highly Cited
2004
An efficient uplink scheduling algorithm for VoIP services is very important for supporting a large number of users with various… 
Highly Cited
2002
Highly Cited
2002
The performance in terms of the mean packet error probability (PEP) in a Rayleigh fading channel with thermal noise is… 
Review
2002
Review
2002
Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT… 
Highly Cited
1994
Highly Cited
1994
Highly Cited
1983
Highly Cited
1983
This paper presents features of the NIL programming language which support the construction of distributed software systems: (1…