Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,846,140 papers from all fields of science
Search
Sign In
Create Free Account
Physical security
Known as:
Security (disambiguation)
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Access control
Artificial intelligence for video surveillance
Atomic authorization
Biometric device
Expand
Broader (1)
Security engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Rattletale: Phase-Coherent Telekinetic Imaging to Detect Tattletale Signs of Structural Defects or Potential Failure
Steve Mann
International Conference on Signal-Image…
2017
Corpus ID: 4878121
(Tele) kinetic imaging (e.g. kinetic sonar, radar, etc.) provides visuo-acoustic feedback in which subject matter undergoes…
Expand
Review
2010
Review
2010
Trusted Wireless Sensor Node Platform
Y. M. Yussoff
,
H. Hashim
World Congress on Engineering
2010
Corpus ID: 13960162
A bstract— Security problems related to Wireless Sensor Networks (WSN) has directly influenced the credibility of WSN…
Expand
2009
2009
Living with Alien invasives. The political ecology of wattle in the eastern highveld Mpumalanga, South Africa
Michelle Aitken
,
H. Rangan
,
C. Kull
2009
Corpus ID: 54847543
Un certain nombre d’arbres australiens - en particulier acacias et eucalyptus - ont ete cultives dans de vastes zones de l…
Expand
Review
2007
Review
2007
Forensic audio and visual evidence 2004-2007 : A Review
A. Ruifrok
,
M. Jessen
,
+4 authors
R. Bruegge
2007
Corpus ID: 16293314
Although audio and visual evidence (video, photographs and laserscans) may have been treated by the same experts in many…
Expand
2006
2006
Democracy and UN Peace-Keeping - Conflict Resolution Through State-Building and Democracy Promotion in Haiti
Julia Leininger
2006
Corpus ID: 55755465
This contribution analyses the relationship between the role of democracy in international law and UN Peacekeeping missions. It…
Expand
2004
2004
An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks
M. Bouassida
,
I. Chrisment
,
O. Festor
NETWORKING
2004
Corpus ID: 15728924
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established…
Expand
2000
2000
Practical Private Information Retrieval with Secure Coprocessors
Sean W. Smith
,
D. Safford
2000
Corpus ID: 59851737
What does it take to implement a server that provides access to records in a large database, in a way that ensures that the this…
Expand
Review
1996
Review
1996
Arithmetic co-processors for public-key cryptography: The state of the art
D. Naccache
,
David M'Raïhi
Smart Card Research and Advanced Application…
1996
Corpus ID: 5452198
Smart-cards have the tremendous advantage, over their magnetic stripe ancestors, of being able to execute cryptographic…
Expand
1994
1994
Controlling multiple security robots in a warehouse environment
H. Everett
,
G. Gilbreath
,
T. A. Heath-Pastore
,
R. Laird
1994
Corpus ID: 17135917
Abstract : The Naval Command Control and Ocean Surveillance Center (NCCOSC) has developed an architecture to provide coordinated…
Expand
1974
1974
Guidelines for Automatic Data Processing Physical Security and Risk Management
Ruth M. Davis
1974
Corpus ID: 107740260
Abstract : This publication provides guidelines to be used by Federal organizations in structuring physical security programs for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE