Access key

Known as: Access keys, Accesskey, Accesskeys 
In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific part of a web page via the keyboard. They were… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1987-2017
05101519872017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Smart city is a new concept for developing and managing a modern city. It involve the usage of technology, especially information… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
Is this relevant?
2014
2014
This short insights paper examines IT Supported Emergency Response systems from the perspective of the digital divide and access… (More)
Is this relevant?
2014
2014
Media sharing in cloud environment, which supports sharing media content at any time and from anywhere, is a promising paradigm… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Implantable medical devices, such as implantable cardiac defibrillators and pacemakers, now use wireless communication protocols… (More)
Is this relevant?
2007
2007
The problem of key management in access hierarchies is how to assign keys to users and classes such that each user, after… (More)
  • table 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
Key-insulated cryptosystem was proposed in order to minimize the damage of secret key exposure. In this paper, we propose a… (More)
Is this relevant?
2006
2006
Standard identity-based (ID-based) signature schemes typically rely on the assumption that secret keys are kept perfectly secure… (More)
Is this relevant?
2005
2005
The key management for multi-type, multi-level scalable access control of a fine granularity scalability codestream is addressed… (More)
Is this relevant?
2004
2004
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2002
2002
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing… (More)
  • figure 1
  • figure 2
Is this relevant?