Journal articles on the topic 'LI. Authentication, and access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'LI. Authentication, and access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textSandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (March 1996): 241–43. http://dx.doi.org/10.1145/234313.234412.
Full textLiu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Full textHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Full textMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (September 23, 2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Full textZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Full textKakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (February 28, 2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.
Full textSUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.
Full textGalka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (November 2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (August 1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.
Full textIskhakov, Andrey Y., Anastasia O. Iskhakova, Roman V. Meshcheryakov, and Anton M. Smirnov. "Authentication model for mobile access subjects." IFAC-PapersOnLine 55, no. 9 (2022): 222–26. http://dx.doi.org/10.1016/j.ifacol.2022.07.039.
Full textQadir, Glena Aziz, and Bzar Khidir Hussan. "An Authentication and Access Control Model for Healthcare based Cloud Services." Journal of Engineering 29, no. 3 (March 1, 2023): 15–26. http://dx.doi.org/10.31026/j.eng.2023.03.02.
Full textLone, Sajaad Ahmed, and A. H. Mir. "Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment." International Journal of Information Technology and Computer Science 14, no. 4 (August 8, 2022): 34–47. http://dx.doi.org/10.5815/ijitcs.2022.04.04.
Full textYin, Xu, and Hai Bei Zheng. "The Research of Workflow Access Control Methods Based on Spring Acegi." Advanced Materials Research 756-759 (September 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.710.
Full textKriti, Kriti, and Indu Kashyap. "Enhanced Role based Access Control: Integrating Auditing and Authentication." International Journal of Computer Applications 72, no. 2 (June 26, 2013): 15–22. http://dx.doi.org/10.5120/12465-8833.
Full textChung, Youngseek, Soonho Jung, Junwoo Kim, Junghoon Lee, and Jaesang Cha. "LED-QR Authentication Technology for Access Control and Security." International journal of advanced smart convergence 4, no. 2 (November 30, 2015): 69–75. http://dx.doi.org/10.7236/ijasc.2015.4.2.69.
Full textNam-Yih Lee. "Integrating access control with user authentication using smart cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 943–48. http://dx.doi.org/10.1109/30.920444.
Full textArfaoui, Amel, Omar Rafik Merad Boudia, Ali Kribeche, Sidi-Mohammed Senouci, and Mohamed Hamdi. "Context-aware access control and anonymous authentication in WBAN." Computers & Security 88 (January 2020): 101496. http://dx.doi.org/10.1016/j.cose.2019.03.017.
Full textXiao, Zhifeng, Bo Fu, Yang Xiao, C. L. Philip Chen, and Wei Liang. "A review of GENI authentication and access control mechanisms." International Journal of Security and Networks 8, no. 1 (2013): 40. http://dx.doi.org/10.1504/ijsn.2013.055046.
Full textChen, Yuhua, and Jinghai Yin. "Design of electroencephalogram authentication access control to smart car." Healthcare Technology Letters 7, no. 4 (August 1, 2020): 109–13. http://dx.doi.org/10.1049/htl.2019.0092.
Full textZhu, Biaokai, Jumin Zhao, Dengao Li, Hong Wang, Ruiqin Bai, Yanxia Li, and Hao Wu. "Cloud access control authentication system using dynamic accelerometers data." Concurrency and Computation: Practice and Experience 30, no. 20 (April 15, 2018): e4474. http://dx.doi.org/10.1002/cpe.4474.
Full textPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (July 2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Full textZhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (November 28, 2019): 5237. http://dx.doi.org/10.3390/s19235237.
Full textMarukhlenko, A. L., A. V. Plugatarev, M. O. Tanygin, L. O. Marukhlenko, and M. Yu Shashkov. "Option of Control of Access to Information Resources Based on Implicit Authentication." Proceedings of the Southwest State University 24, no. 2 (October 4, 2020): 108–21. http://dx.doi.org/10.21869/2223-1560-2020-24-2-108-121.
Full textShu, Yingli, Quande Yuan, Wende Ke, and Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism." Electronics 11, no. 23 (November 28, 2022): 3938. http://dx.doi.org/10.3390/electronics11233938.
Full textEaton, Jonathan. "Project headline: Access control and authentication ‐ issues for access to networked information resources." New Review of Academic Librarianship 4, no. 1 (January 1998): 11–17. http://dx.doi.org/10.1080/13614539809516764.
Full textPu, Li'e, and Jialin Sun. "Face Detection-Induced Access Control System via Large Margin Metric Learning." International Journal of Distributed Systems and Technologies 13, no. 3 (July 1, 2022): 1–11. http://dx.doi.org/10.4018/ijdst.307987.
Full textNwogu, Chijioke, Monday Eze, and Charles Okunbor. "Design and Implementation of Access Door Control with Mo-bile Alert." International Journal of Engineering & Technology 9, no. 2 (May 7, 2020): 480. http://dx.doi.org/10.14419/ijet.v9i2.30382.
Full textSatanasaowapak, Pak, Witawat Kawseewai, Suchada Promlee, and Anuwat Vilamat. "Residential access control system using QR code and the IoT." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (August 1, 2021): 3267. http://dx.doi.org/10.11591/ijece.v11i4.pp3267-3274.
Full textHajny, Jan, Petr Dzurenda, and Lukas Malina. "Multidevice Authentication with Strong Privacy Protection." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–12. http://dx.doi.org/10.1155/2018/3295148.
Full textGajmal, Yogesh M., and Udayakumar R. "Analysis of Authentication based Data Access Control Systems in Cloud." Journal of Advanced Research in Dynamical and Control Systems 12, no. 07-SPECIAL ISSUE (June 30, 2020): 2961–67. http://dx.doi.org/10.5373/jardcs/v12sp7/20202441.
Full textStasev, Yu V., I. D. Gorbenko, and N. V. Pastukhov. "Authentication in space system communication and control with numerous access." Kosmìčna nauka ì tehnologìâ 3, no. 1-2 (January 30, 1997): 83–86. http://dx.doi.org/10.15407/knit1997.01.083.
Full textChen, Ling. "Research on Role Access Control Model Based on Identity Authentication." Journal of Physics: Conference Series 2025, no. 1 (September 1, 2021): 012105. http://dx.doi.org/10.1088/1742-6596/2025/1/012105.
Full textGodovnikov, Evgeny A., Anatoliy V. Shicelov, and Ruslan T. Usmanov. "Design of physical access control system with integrated wireless authentication." Yugra State University Bulletin 15, no. 2 (December 10, 2019): 23–28. http://dx.doi.org/10.17816/byusu20190223-28.
Full textWang, Gui Chao, Ai Li Zhang, and Yong Zhen Li. "Secure Authentication Protocol of RFID System Based on Access Control." Advanced Engineering Forum 6-7 (September 2012): 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.
Full textYuanchao Shu, Yu Jason Gu, and Jiming Chen. "Dynamic Authentication with Sensory Information for the Access Control Systems." IEEE Transactions on Parallel and Distributed Systems 25, no. 2 (February 2014): 427–36. http://dx.doi.org/10.1109/tpds.2013.153.
Full textYen, Sung-Ming, and Chi-Sung Laih. "The design of dynamic access control scheme with user authentication." Computers & Mathematics with Applications 25, no. 7 (April 1993): 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.
Full textWu, Wei-Chen, and Yi-Ming Chen. "Improving the Authentication Scheme and Access Control Protocol for VANETs." Entropy 16, no. 11 (November 19, 2014): 6152–65. http://dx.doi.org/10.3390/e16116152.
Full textZhang, Leyou, Yadi Ye, and Yi Mu. "Multiauthority Access Control With Anonymous Authentication for Personal Health Record." IEEE Internet of Things Journal 8, no. 1 (January 1, 2021): 156–67. http://dx.doi.org/10.1109/jiot.2020.3000775.
Full textAl-Mahmud, Abdullah, and Matei Ciobanu Morogan. "Identity-based Authentication and Access Control in Wireless Sensor Networks." International Journal of Computer Applications 41, no. 13 (March 31, 2012): 18–24. http://dx.doi.org/10.5120/5602-7858.
Full textYuan, Hu, Carsten Maple, Yi Lu, and Tim Watson. "Peer-assisted location authentication and access control for wireless networks." Internet Technology Letters 2, no. 1 (September 7, 2018): e71. http://dx.doi.org/10.1002/itl2.71.
Full textFerrazani Mattos, Diogo Menezes, and Otto Carlos Muniz Bandeira Duarte. "AuthFlow: authentication and access control mechanism for software defined networking." Annals of Telecommunications 71, no. 11-12 (March 28, 2016): 607–15. http://dx.doi.org/10.1007/s12243-016-0505-z.
Full textDing, Yuhang, Yanran Zhang, Bo Qin, Qin Wang, Zihan Yang, and Wenchang Shi. "A Scalable Cross-Chain Access Control and Identity Authentication Scheme." Sensors 23, no. 4 (February 10, 2023): 2000. http://dx.doi.org/10.3390/s23042000.
Full textБуяков, К. Е., Д. А. Елизаров, М. Я. Епифанцева, Т. А. Мызникова, and А. В. Шилер. "Development of biometric access control system." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 2 (June 21, 2022): 43–51. http://dx.doi.org/10.18137/rnu.v9187.22.02.p.043.
Full textWu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.
Full textYu, Linsheng, Mingxing He, Hongbin Liang, Ling Xiong, and Yang Liu. "A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services." Sensors 23, no. 3 (January 22, 2023): 1264. http://dx.doi.org/10.3390/s23031264.
Full textKhan, Abdul Raouf, and Latifa Khalid Alnwihel. "A Brief Review on Cloud Computing Authentication Frameworks." Engineering, Technology & Applied Science Research 13, no. 1 (February 1, 2023): 9997–10004. http://dx.doi.org/10.48084/etasr.5479.
Full textZhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.
Full textSingh, Inderpal, and Balraj Singh. "Access management of IoT devices using access control mechanism and decentralized authentication: A review." Measurement: Sensors 25 (February 2023): 100591. http://dx.doi.org/10.1016/j.measen.2022.100591.
Full text