Journal articles on the topic 'LI. Authentication, and access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'LI. Authentication, and access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
A.Karunamurthy,, Dr. "LOCATION- BASED SECURITY FOR PREVENTING DATA EXPOSURE IN CORPORATE ENVIRNOMENT." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49363.
Full textJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textSandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (1996): 241–43. http://dx.doi.org/10.1145/234313.234412.
Full textZyryanova, Svetlana A., Yuliya Yu Vassunova, and Irina V. Chumak. "INNOVATIVE AUTHENTICATION AND ACCESS CONTROL TECHNOLOGIES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4/9, no. 145 (2024): 115–21. http://dx.doi.org/10.36871/ek.up.p.r.2024.04.09.018.
Full textMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Full textS, Krishnarajan, and A. Rengarajan. "Surveying Authentication and Authorization Mechanisms in Today's Web Technology Landscape." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 05 (2024): 6337–40. http://dx.doi.org/10.15680/ijircce.2024.1205198.
Full textChoubisa, Mukesh, and Brijesh Jajal. "Analysis of Secure Authentication for IoT using Token-based access control." International Journal of Scientific Research in Computer Science and Engineering 13, no. 1 (2025): 21–25. https://doi.org/10.26438/ijsrcse.v13i1.609.
Full textLiu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Full textHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Full textKang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.
Full textKabier, Maha K., Ali A. Yassin, Zaid A. Abduljabbar, and Songfeng Lu. "Role Based Access Control Using Biometric the in Educational System." 49 49, no. 1 (2023): 85–101. http://dx.doi.org/10.56714/bjrs.49.1.8.
Full textStrelkovskaya, Irina, Oleksiy Onatskiy, and Larysa Yona. "TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS." Information and Telecommunication Sciences, no. 2 (December 21, 2023): 17–25. http://dx.doi.org/10.20535/2411-2976.22023.17-25.
Full textRehman, Shafiq Ur, Hafiz Gulfam Ahmad Umar, Muhammad Aoun, et al. "Advanced Authentication and Access Control for Encrypted Images in the 3D Cube Domain." Bulletin of Business and Economics (BBE) 12, no. 3 (2023): 640–49. http://dx.doi.org/10.61506/01.00084.
Full textSaleem, Jibran, Umar Raza, Mohammad Hammoudeh, and William Holderbaum. "Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control." Sensors 25, no. 9 (2025): 2779. https://doi.org/10.3390/s25092779.
Full textQadir, Glena Aziz, and Bzar Khidir Hussan. "An Authentication and Access Control Model for Healthcare based Cloud Services." Journal of Engineering 29, no. 3 (2023): 15–26. http://dx.doi.org/10.31026/j.eng.2023.03.02.
Full textMpamugo, Ezichi, and Godwin Ansa. "Enhancing Network Security in Mobile Applications with Role-Based Access Control." Journal of Information Systems and Informatics 6, no. 3 (2024): 1872–99. http://dx.doi.org/10.51519/journalisi.v6i3.863.
Full textZhao, Xinyang, Bocheng Zhong, and Zicai Cui. "Design of a Decentralized Identifier-Based Authentication and Access Control Model for Smart Homes." Electronics 12, no. 15 (2023): 3334. http://dx.doi.org/10.3390/electronics12153334.
Full textLone, Sajaad Ahmed, and A. H. Mir. "Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment." International Journal of Information Technology and Computer Science 14, no. 4 (2022): 34–47. http://dx.doi.org/10.5815/ijitcs.2022.04.04.
Full textYin, Xu, and Hai Bei Zheng. "The Research of Workflow Access Control Methods Based on Spring Acegi." Advanced Materials Research 756-759 (September 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.710.
Full textLiu, Donglan, Xin Liu, Rui Wang, et al. "A Multi-Blockchain-Based Cross-Domain Authentication and Authorization Scheme for Energy Internet." Wireless Communications and Mobile Computing 2023 (April 29, 2023): 1–13. http://dx.doi.org/10.1155/2023/4778967.
Full textMohammed, Abdelnasser, Ahmed Salama, Nasser Shebka, and Amr Ismail. "Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework." Engineering, Technology & Applied Science Research 15, no. 1 (2025): 20144–50. https://doi.org/10.48084/etasr.9554.
Full textZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Full textKakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.
Full textSUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.
Full textGalka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.
Full textPremsai, Ranga. "Cybersecurity Risks in Identity And Access Management Using An Adaptive trust Authenticate Protocol." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem25645.
Full textHussain, S., S. Farid, M. Alam, S. Iqbal, and S. Ahmad. "Modeling of Access Control System in Event-B." Nucleus 55, no. 2 (2018): 74–84. https://doi.org/10.71330/thenucleus.2018.281.
Full textIskhakov, Andrey Y., Anastasia O. Iskhakova, Roman V. Meshcheryakov, and Anton M. Smirnov. "Authentication model for mobile access subjects." IFAC-PapersOnLine 55, no. 9 (2022): 222–26. http://dx.doi.org/10.1016/j.ifacol.2022.07.039.
Full textZhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (2019): 5237. http://dx.doi.org/10.3390/s19235237.
Full textMathumitha Jeyashri. J, Swetha. S, Vishwa. J, and Satheeswaran. C. "Enhancing Security Within Restricted Hospital Zones by Integrating Finger Vein Authentication." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 05 (2024): 1265–70. http://dx.doi.org/10.47392/irjaeh.2024.0174.
Full textO.Pandithurai, Et al. "Cloud Storage Systems with Secure Attribute-Based Access Control." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 327–31. http://dx.doi.org/10.17762/ijritcc.v11i3.9862.
Full textZheng, Jihu, Haixin Duan, Chenyu Wang, Qiang Cao, Guoai Xu, and Rui Fang. "A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles." Electronics 13, no. 10 (2024): 1939. http://dx.doi.org/10.3390/electronics13101939.
Full textXu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.
Full textAmit, Gupta, and Arora Gaurav. "Location-based access to shared devices." Journal of Scientific and Engineering Research 8, no. 2 (2021): 274–77. https://doi.org/10.5281/zenodo.11487233.
Full textZhao, Ge, Xiangrong Li, and Hao Li. "A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System." International Journal on Semantic Web and Information Systems 20, no. 1 (2024): 1–27. http://dx.doi.org/10.4018/ijswis.341233.
Full textPoddubnyi, Vadym, and Oleksandr Sievierinov. "Method of user authentication in information and communication systems using zero watermark." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 2(32) (June 30, 2025): 69–78. https://doi.org/10.30837/2522-9818.2025.2.069.
Full textTaskeen, Fathima, and Mary Vennila S. "An Improved Mechanism for SDN Flow Space to Control Oriented Authentication NAA Network." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2019): 350–54. https://doi.org/10.35940/ijeat.B3014.129219.
Full textPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Full textMarukhlenko, A. L., A. V. Plugatarev, M. O. Tanygin, L. O. Marukhlenko, and M. Yu Shashkov. "Option of Control of Access to Information Resources Based on Implicit Authentication." Proceedings of the Southwest State University 24, no. 2 (2020): 108–21. http://dx.doi.org/10.21869/2223-1560-2020-24-2-108-121.
Full textGhosh, Ms Debosree, ,Mr Arupam Chakraborty, and ,Mr Rejaul Haque Molla. "SECURING WIRELESS BODY AREA NETWORKS: CASE STUDIES IN SECURITY AND PRIVACY." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26164.
Full textWu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.
Full textBoluwatife, Christianah Abe, Olajumoke Araromi Haonat, Segun Shokenu Emmanuel, et al. "Biometric Access Control Using Voice and Fingerprint." Engineering and Technology Journal 07, no. 07 (2022): 1376–82. https://doi.org/10.5281/zenodo.6922206.
Full textZou, Jing, Peizhe Xin, Zhihong Xiao, et al. "Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System." Electronics 12, no. 8 (2023): 1882. http://dx.doi.org/10.3390/electronics12081882.
Full textYu, Linsheng, Mingxing He, Hongbin Liang, Ling Xiong, and Yang Liu. "A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services." Sensors 23, no. 3 (2023): 1264. http://dx.doi.org/10.3390/s23031264.
Full textNwogu, Chijioke, Monday Eze, and Charles Okunbor. "Design and Implementation of Access Door Control with Mo-bile Alert." International Journal of Engineering & Technology 9, no. 2 (2020): 480. http://dx.doi.org/10.14419/ijet.v9i2.30382.
Full textKhan, Abdul Raouf, and Latifa Khalid Alnwihel. "A Brief Review on Cloud Computing Authentication Frameworks." Engineering, Technology & Applied Science Research 13, no. 1 (2023): 9997–10004. http://dx.doi.org/10.48084/etasr.5479.
Full textShu, Yingli, Quande Yuan, Wende Ke, and Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism." Electronics 11, no. 23 (2022): 3938. http://dx.doi.org/10.3390/electronics11233938.
Full textNagaraju, Mr D. "Exam Hall Authentication Using Arduino Board." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45331.
Full text