Physical access

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1975-2017
020406019752017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The cryptographic privacy-enhancing technologies were originally designed to improve the privacy and digital identity protection… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2012
2012
The ability to safely keep a secret in memory is central to the vast majority of security schemes, but storing and erasing these… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
Nowadays, the authentication methods of physical access control such as key, smart card, and OTP (One Time Password) card require… (More)
  • figure 1
  • table I
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2011
2011
Electronic, software-managed mechanisms using, for example, radiofrequency identification (RFID) cards, enable great flexibility… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, retains its contents for several… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computing devices equipped with… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.6
  • table 3.1
Is this relevant?
2007
2007
Physical security has received increased attention after 9/11. However, access control to physical units has not been explored… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present an optimization method and al gorithm designed for three objectives: physi cal data independence, semantic… (More)
Is this relevant?