Skip to search formSkip to main contentSkip to account menu

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
  • 1. G
  • 2012
  • Corpus ID: 18782980
The problem in face recognition is to find the best match of an unknown image against a database of face models or to determine… 
2012
2012
Setting a powerful spectrum sensing and access policy increases the throughput of cognitive radio networks (CRNs). In this paper… 
2011
2011
Users of mobile devices can nowadays easily create large quantities of mobile multimedia documents tracing significant events… 
2011
2011
Smartphones, which contain a large number of sensors and integrated devices, are becoming increasingly powerful and fully… 
Highly Cited
2006
Highly Cited
2006
This article addresses the quality of service provisioning issues in the wireless mesh backbone for broadband wireless access… 
2005
2005
  • M. Hassinen
  • 2005
  • Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to… 
2005
2005
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in… 
2004
2004
We propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission… 
2003
2003
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership… 
1999
1999
1 Introduction The traditional communication architecture for control systems is point-to-point, which has been successfully…