Skip to search formSkip to main contentSkip to account menu

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
sequential cooperative spectrum sensing algorithm is developed for multi-channel cognitive radio (CR) systems. Each CR quantizes… 
Highly Cited
2008
Highly Cited
2008
  • C. ChaoYi-Wei Lee
  • 2008
  • Corpus ID: 5611631
Wireless sensor networks are mainly designed for environment surveillance where wireless sensor nodes cooperate to get their job… 
Highly Cited
2007
Highly Cited
2007
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of… 
Highly Cited
2005
Highly Cited
2005
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless… 
Highly Cited
2005
Highly Cited
2005
Current wireless sensor network (WSN) architectures are based on the assumption that all sensor nodes are participating in a… 
Highly Cited
2002
Highly Cited
2002
The performance in terms of the mean packet error probability (PEP) in a Rayleigh fading channel with thermal noise is… 
Highly Cited
1998
Highly Cited
1998
Fairness algorithms and access methods enable non-zero channel access for wireless communication systems operating in a random… 
Highly Cited
1983
Highly Cited
1983
This paper presents features of the NIL programming language which support the construction of distributed software systems: (1…