Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,381,609 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Face Recognition System Using Back Propagation Artificial Neural Network
1. G
2012
Corpus ID: 18782980
The problem in face recognition is to find the best match of an unknown image against a database of face models or to determine…
Expand
2012
2012
Intelligent Sensing Matrix Setting in Cognitive Radio Networks
H. S. Ghadikolaei
,
R. Fallahi
IEEE Communications Letters
2012
Corpus ID: 27071632
Setting a powerful spectrum sensing and access policy increases the throughput of cognitive radio networks (CRNs). In this paper…
Expand
2011
2011
Towards the semantic and context-aware management of mobile multimedia
Windson Viana
,
A. Miron
,
Bogdan Moisuc
,
J. Gensel
,
M. Villanova-Oliver
,
H. Martin
Multimedia tools and applications
2011
Corpus ID: 10041673
Users of mobile devices can nowadays easily create large quantities of mobile multimedia documents tracing significant events…
Expand
2011
2011
Weaving a Distributed, Semantic Social Network for Mobile Users
Sebastian Tramp
,
Philipp Frischmuth
,
Natanael Arndt
,
Timofey Ermilov
,
S. Auer
Extended Semantic Web Conference
2011
Corpus ID: 14653274
Smartphones, which contain a large number of sensors and integrated devices, are becoming increasingly powerful and fully…
Expand
Highly Cited
2006
Highly Cited
2006
Differentiated services for wireless mesh backbone
Hai Jiang
,
W. Zhuang
,
Xuemin Shen
,
A. Abdrabou
,
Ping Wang
IEEE Communications Magazine
2006
Corpus ID: 2711274
This article addresses the quality of service provisioning issues in the wireless mesh backbone for broadband wireless access…
Expand
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
2005
2005
Security Requirements---A Field Study of Current Practice
John Wilander
,
Jens Gustavsson
2005
Corpus ID: 8833422
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in…
Expand
2004
2004
Secret sharing with access structures in a hierarchy
Chinchen Chang
,
Chu-Hsing Lin
,
Wei Lee
,
Pai-Cheng Hwang
18th International Conference on Advanced…
2004
Corpus ID: 5909608
We propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission…
Expand
2003
2003
Trust modeling for peer-to-peer based computing systems
Farag Azzedin
,
Muthucumaru Maheswaran
Proceedings International Parallel and…
2003
Corpus ID: 29557781
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership…
Expand
1999
1999
Performance Evaluation of Control Networks : Ethernet ,
Feng‐Li Lian
,
J. Moyne
,
D. Tilbury
1999
Corpus ID: 18131346
1 Introduction The traditional communication architecture for control systems is point-to-point, which has been successfully…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE