Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Review
2019
Review
2019
The revolution of cooperative connected and automated vehicles is about to begin and a key milestone is the introduction of short… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Review
2018
Review
2018
The Internet of things (IoT), which integrates a variety of devices into networks to provide advanced and intelligent services… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Review
2018
Review
2018
Emerging technologies such as the Internet of Things (IoT) require latency-aware computation for real-time application processing… Expand
Highly Cited
2006
Highly Cited
2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at… Expand
Highly Cited
2004
Highly Cited
2004
This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2001
Highly Cited
2001
Although several access control policies can be devised for controlling access to information, all existing authorization models… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
1999
Highly Cited
1999
The medium access control (MAC) and physical characteristics for wireless local area networks (LANs) are specified in this… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1997
Highly Cited
1997
services are specified here by describing the service primitives and parameters that characterize each service. This definition… Expand
  • figure 5-1
  • figure 7-35
  • figure 7-89
  • figure 9-2
  • figure 14-10