Articles de revues sur le sujet « LI. Authentication, and access control »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « LI. Authentication, and access control ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
A.Karunamurthy,, Dr. "LOCATION- BASED SECURITY FOR PREVENTING DATA EXPOSURE IN CORPORATE ENVIRNOMENT." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49363.
Texte intégralJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Texte intégralSandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (1996): 241–43. http://dx.doi.org/10.1145/234313.234412.
Texte intégralZyryanova, Svetlana A., Yuliya Yu Vassunova, and Irina V. Chumak. "INNOVATIVE AUTHENTICATION AND ACCESS CONTROL TECHNOLOGIES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4/9, no. 145 (2024): 115–21. http://dx.doi.org/10.36871/ek.up.p.r.2024.04.09.018.
Texte intégralMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Texte intégralS, Krishnarajan, and A. Rengarajan. "Surveying Authentication and Authorization Mechanisms in Today's Web Technology Landscape." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 05 (2024): 6337–40. http://dx.doi.org/10.15680/ijircce.2024.1205198.
Texte intégralChoubisa, Mukesh, and Brijesh Jajal. "Analysis of Secure Authentication for IoT using Token-based access control." International Journal of Scientific Research in Computer Science and Engineering 13, no. 1 (2025): 21–25. https://doi.org/10.26438/ijsrcse.v13i1.609.
Texte intégralLiu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Texte intégralHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Texte intégralKang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.
Texte intégralKabier, Maha K., Ali A. Yassin, Zaid A. Abduljabbar, and Songfeng Lu. "Role Based Access Control Using Biometric the in Educational System." 49 49, no. 1 (2023): 85–101. http://dx.doi.org/10.56714/bjrs.49.1.8.
Texte intégralStrelkovskaya, Irina, Oleksiy Onatskiy, and Larysa Yona. "TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS." Information and Telecommunication Sciences, no. 2 (December 21, 2023): 17–25. http://dx.doi.org/10.20535/2411-2976.22023.17-25.
Texte intégralRehman, Shafiq Ur, Hafiz Gulfam Ahmad Umar, Muhammad Aoun, et al. "Advanced Authentication and Access Control for Encrypted Images in the 3D Cube Domain." Bulletin of Business and Economics (BBE) 12, no. 3 (2023): 640–49. http://dx.doi.org/10.61506/01.00084.
Texte intégralSaleem, Jibran, Umar Raza, Mohammad Hammoudeh, and William Holderbaum. "Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control." Sensors 25, no. 9 (2025): 2779. https://doi.org/10.3390/s25092779.
Texte intégralQadir, Glena Aziz, and Bzar Khidir Hussan. "An Authentication and Access Control Model for Healthcare based Cloud Services." Journal of Engineering 29, no. 3 (2023): 15–26. http://dx.doi.org/10.31026/j.eng.2023.03.02.
Texte intégralMpamugo, Ezichi, and Godwin Ansa. "Enhancing Network Security in Mobile Applications with Role-Based Access Control." Journal of Information Systems and Informatics 6, no. 3 (2024): 1872–99. http://dx.doi.org/10.51519/journalisi.v6i3.863.
Texte intégralZhao, Xinyang, Bocheng Zhong, and Zicai Cui. "Design of a Decentralized Identifier-Based Authentication and Access Control Model for Smart Homes." Electronics 12, no. 15 (2023): 3334. http://dx.doi.org/10.3390/electronics12153334.
Texte intégralLone, Sajaad Ahmed, and A. H. Mir. "Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment." International Journal of Information Technology and Computer Science 14, no. 4 (2022): 34–47. http://dx.doi.org/10.5815/ijitcs.2022.04.04.
Texte intégralYin, Xu, and Hai Bei Zheng. "The Research of Workflow Access Control Methods Based on Spring Acegi." Advanced Materials Research 756-759 (September 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.710.
Texte intégralLiu, Donglan, Xin Liu, Rui Wang, et al. "A Multi-Blockchain-Based Cross-Domain Authentication and Authorization Scheme for Energy Internet." Wireless Communications and Mobile Computing 2023 (April 29, 2023): 1–13. http://dx.doi.org/10.1155/2023/4778967.
Texte intégralMohammed, Abdelnasser, Ahmed Salama, Nasser Shebka, and Amr Ismail. "Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework." Engineering, Technology & Applied Science Research 15, no. 1 (2025): 20144–50. https://doi.org/10.48084/etasr.9554.
Texte intégralZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Texte intégralKakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.
Texte intégralSUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.
Texte intégralGalka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.
Texte intégralKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Texte intégralKarger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.
Texte intégralPremsai, Ranga. "Cybersecurity Risks in Identity And Access Management Using An Adaptive trust Authenticate Protocol." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem25645.
Texte intégralHussain, S., S. Farid, M. Alam, S. Iqbal, and S. Ahmad. "Modeling of Access Control System in Event-B." Nucleus 55, no. 2 (2018): 74–84. https://doi.org/10.71330/thenucleus.2018.281.
Texte intégralIskhakov, Andrey Y., Anastasia O. Iskhakova, Roman V. Meshcheryakov, and Anton M. Smirnov. "Authentication model for mobile access subjects." IFAC-PapersOnLine 55, no. 9 (2022): 222–26. http://dx.doi.org/10.1016/j.ifacol.2022.07.039.
Texte intégralZhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (2019): 5237. http://dx.doi.org/10.3390/s19235237.
Texte intégralMathumitha Jeyashri. J, Swetha. S, Vishwa. J, and Satheeswaran. C. "Enhancing Security Within Restricted Hospital Zones by Integrating Finger Vein Authentication." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 05 (2024): 1265–70. http://dx.doi.org/10.47392/irjaeh.2024.0174.
Texte intégralO.Pandithurai, Et al. "Cloud Storage Systems with Secure Attribute-Based Access Control." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 327–31. http://dx.doi.org/10.17762/ijritcc.v11i3.9862.
Texte intégralZheng, Jihu, Haixin Duan, Chenyu Wang, Qiang Cao, Guoai Xu, and Rui Fang. "A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles." Electronics 13, no. 10 (2024): 1939. http://dx.doi.org/10.3390/electronics13101939.
Texte intégralXu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.
Texte intégralAmit, Gupta, and Arora Gaurav. "Location-based access to shared devices." Journal of Scientific and Engineering Research 8, no. 2 (2021): 274–77. https://doi.org/10.5281/zenodo.11487233.
Texte intégralZhao, Ge, Xiangrong Li, and Hao Li. "A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System." International Journal on Semantic Web and Information Systems 20, no. 1 (2024): 1–27. http://dx.doi.org/10.4018/ijswis.341233.
Texte intégralPoddubnyi, Vadym, and Oleksandr Sievierinov. "Method of user authentication in information and communication systems using zero watermark." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 2(32) (June 30, 2025): 69–78. https://doi.org/10.30837/2522-9818.2025.2.069.
Texte intégralTaskeen, Fathima, and Mary Vennila S. "An Improved Mechanism for SDN Flow Space to Control Oriented Authentication NAA Network." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2019): 350–54. https://doi.org/10.35940/ijeat.B3014.129219.
Texte intégralPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Texte intégralMarukhlenko, A. L., A. V. Plugatarev, M. O. Tanygin, L. O. Marukhlenko, and M. Yu Shashkov. "Option of Control of Access to Information Resources Based on Implicit Authentication." Proceedings of the Southwest State University 24, no. 2 (2020): 108–21. http://dx.doi.org/10.21869/2223-1560-2020-24-2-108-121.
Texte intégralGhosh, Ms Debosree, ,Mr Arupam Chakraborty, and ,Mr Rejaul Haque Molla. "SECURING WIRELESS BODY AREA NETWORKS: CASE STUDIES IN SECURITY AND PRIVACY." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26164.
Texte intégralWu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.
Texte intégralBoluwatife, Christianah Abe, Olajumoke Araromi Haonat, Segun Shokenu Emmanuel, et al. "Biometric Access Control Using Voice and Fingerprint." Engineering and Technology Journal 07, no. 07 (2022): 1376–82. https://doi.org/10.5281/zenodo.6922206.
Texte intégralZou, Jing, Peizhe Xin, Zhihong Xiao, et al. "Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System." Electronics 12, no. 8 (2023): 1882. http://dx.doi.org/10.3390/electronics12081882.
Texte intégralYu, Linsheng, Mingxing He, Hongbin Liang, Ling Xiong, and Yang Liu. "A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services." Sensors 23, no. 3 (2023): 1264. http://dx.doi.org/10.3390/s23031264.
Texte intégralNwogu, Chijioke, Monday Eze, and Charles Okunbor. "Design and Implementation of Access Door Control with Mo-bile Alert." International Journal of Engineering & Technology 9, no. 2 (2020): 480. http://dx.doi.org/10.14419/ijet.v9i2.30382.
Texte intégralKhan, Abdul Raouf, and Latifa Khalid Alnwihel. "A Brief Review on Cloud Computing Authentication Frameworks." Engineering, Technology & Applied Science Research 13, no. 1 (2023): 9997–10004. http://dx.doi.org/10.48084/etasr.5479.
Texte intégralShu, Yingli, Quande Yuan, Wende Ke, and Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism." Electronics 11, no. 23 (2022): 3938. http://dx.doi.org/10.3390/electronics11233938.
Texte intégralNagaraju, Mr D. "Exam Hall Authentication Using Arduino Board." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45331.
Texte intégral