Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,673,921 papers from all fields of science
Search
Sign In
Create Free Account
Physical access
Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Access control
Cold boot attack
Computer and network surveillance
Hardware keylogger
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Self-Encrypting Disks pose Self-Decrypting Risks How to break Hardware-based Full Disk Encryption
Tilo Müller
,
Tobias Latzo
,
F. Freiling
,
Friedrich-Alexander
2013
Corpus ID: 53407224
Hardware-based full disk encryption (FDE) drives, such as Intel’s SSD 320 and 520 series, are widely believed to be a fast and…
Expand
2013
2013
Climate Change Adaptation and Coastal Property Rights: A Massachusetts Case Study
Lara D. Guercio
2013
Corpus ID: 128993967
This article examines how existing state laws, including coastal property law and public trust doctrines, are likely to create…
Expand
2012
2012
Organizational Implementation of Telemedicine Technology: Methodology and Field Experience
L. Branagan
,
Lin L. Chase
IEEE Global Humanitarian Technology Conference
2012
Corpus ID: 2591349
Telemedicine has the potential to bring medical expertise to patients located anywhere in the world. Unfortunately, history…
Expand
2011
2011
Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database
Malek Al-Zewairi
,
Ja'far Alqatawna
,
Omar Sultan Al-Kadi
IEEE Jordan Conference on Applied Electrical…
2011
Corpus ID: 16215402
Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies…
Expand
Review
2011
Review
2011
Virtual fun and challenge: Case study of learning cybercrime in second life
J. Yap
Defense Science Research Conference and Expo (DSR…
2011
Corpus ID: 7993084
In 2010, the National University of Singapore (NUS) launched a campus-wide e-Learning Week that require students to attend…
Expand
2007
2007
Evaluation and analysis of a face and voice outdoor multi-biometric system
H. Vajaria
,
T. Islam
,
P. Mohanty
,
Sudeep Sarkar
,
R. Sankar
,
R. Kasturi
Pattern Recognition Letters
2007
Corpus ID: 18998889
1999
1999
Considerations for an effective telecommunications-use policy
M. Whitman
,
A. Townsend
,
Robert J. Aalberts
Communications of the ACM
1999
Corpus ID: 11853949
information privacy issues, has created a large gray area in organizational policy-making. What exactly should an organization…
Expand
1997
1997
An integrated multicast connection management solution for wired and wireless ATM networks
L. Ngoh
,
Hongyi Li
,
Weiguo Wang
IEEE Communications Magazine
1997
Corpus ID: 12650487
With the prospect of commercializing wireless ATM networks fast becoming a reality, and ATM becoming one of the main network…
Expand
1986
1986
Establishment and maintenance of maternal responsiveness in postpartum Wistar rats
M. Jakubowski
,
J. Terkel
Animal Behaviour
1986
Corpus ID: 53170092
1984
1984
Hardware Requirements for Secure Computer Systems: A Framework
C. Landwehr
,
John Millar Carroll
IEEE Symposium on Security and Privacy
1984
Corpus ID: 7513538
This report develops a new set of criteria for evaluating computer architectures that are to support systems with security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE