Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Collision-Tolerant Transmission with Narrow-beam Antennas
(Articles)
Hong-Ning DAI
,
Kam-Wing NG
,
Min-You WU
,
Bo LI
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14035
5,312
Downloads
9,734
Views
Citations
Role of Time-Domain Based Access Control Model
(Articles)
Chaoqun Liu
,
Zhen Peng
,
Lili Wu
Journal of Software Engineering and Applications
Vol.9 No.2
,February 26, 2016
DOI:
10.4236/jsea.2016.92004
3,317
Downloads
4,831
Views
Citations
RoBAC—A New Way of Access Control for Cloud
(Articles)
G. Krishnamoorthy
,
N. UmaMaheswari
,
R. Venkatesh
Circuits and Systems
Vol.7 No.7
,May 27, 2016
DOI:
10.4236/cs.2016.77095
1,551
Downloads
3,536
Views
Citations
This article belongs to the Special Issue on
Emerging Technology Trends in Circuits and Systems
A Dynamic Access Control Method for SDN
(Articles)
Dexian Chang
,
Wanzhong Sun
,
Yingjie Yang
,
Tingting Wang
Journal of Computer and Communications
Vol.7 No.10
,October 16, 2019
DOI:
10.4236/jcc.2019.710010
580
Downloads
1,676
Views
Citations
Experience-Based Access Control in UbiComp: A New Paradigm
(Articles)
Nalini A. Mhetre
,
Arvind V. Deshpande
,
Parikshit N. Mahalle
Journal of Computer and Communications
Vol.10 No.1
,January 30, 2022
DOI:
10.4236/jcc.2022.101007
241
Downloads
952
Views
Citations
User-Based Discrete-Time Queuing Analysis for Opportunistic Spectrum Access in Cognitive Radio Networks
(Articles)
Lei Zhang
,
Shanzhi Mou
,
Yu Wang
Advances in Pure Mathematics
Vol.9 No.1
,January 10, 2019
DOI:
10.4236/apm.2019.91001
728
Downloads
1,379
Views
Citations
Hardware/Compiler Memory Protection in Sensor Nodes
(Articles)
Lanfranco LOPRIORE
Int'l J. of Communications, Network and System Sciences
Vol.1 No.3
,October 9, 2008
DOI:
10.4236/ijcns.2008.13028
6,298
Downloads
10,363
Views
Citations
Access Control for Manufacturing Process in Networked Manufacturing Environment
(Articles)
Ke Zhou
,
Min Lv
,
Gang Wang
,
Bingyin Ren
Journal of Service Science and Management
Vol.2 No.2
,June 17, 2009
DOI:
10.4236/jssm.2009.22014
5,406
Downloads
9,620
Views
Citations
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
(Articles)
Zheng Teng
,
Ki-Il Kim
Communications and Network
Vol.2 No.2
,May 31, 2010
DOI:
10.4236/cn.2010.22017
10,766
Downloads
21,665
Views
Citations
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
(Articles)
Yan Wang
,
Hongli Liu
,
Jun Feng
Circuits and Systems
Vol.1 No.1
,July 28, 2010
DOI:
10.4236/cs.2010.11005
10,728
Downloads
20,622
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,841
Downloads
9,484
Views
Citations
Evaluation of Different Electronic Product Code Discovery Service Models
(Articles)
Su Mon Kywe
,
Jie Shi
,
Yingjiu Li
,
Raghuwanshi Kailash
Advances in Internet of Things
Vol.2 No.2
,April 24, 2012
DOI:
10.4236/ait.2012.22005
6,400
Downloads
14,232
Views
Citations
Performance Analysis of Unified Failure Model for Emerging WiMAX Networks
(Articles)
Rajesh Anbazhagan
,
Nakkeeran Rangaswamy
Wireless Engineering and Technology
Vol.3 No.2
,April 28, 2012
DOI:
10.4236/wet.2012.32011
6,182
Downloads
9,655
Views
Citations
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models
(Articles)
Alfredo Maesa
,
Fabio Garzia
,
Michele Scarpiniti
,
Roberto Cusani
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34041
7,588
Downloads
14,972
Views
Citations
Trust Management for Mobile Media Distribution
(Articles)
Raimund K. Ege
Engineering
Vol.5 No.12
,November 26, 2013
DOI:
10.4236/eng.2013.512112
3,803
Downloads
7,030
Views
Citations
Privacy Preserving Risk Mitigation Approach for Healthcare Domain
(Articles)
Shaden S. Al Aqeeli
,
Mznah A. Al-Rodhaan
,
Yuan Tian
,
Abdullah M. Al-Dhelaan
E-Health Telecommunication Systems and Networks
Vol.7 No.1
,March 29, 2018
DOI:
10.4236/etsn.2018.71001
1,131
Downloads
2,258
Views
Citations
Design of Assignment Based on Flipping Classroom—Taking the Access Control List of “Network Devices Configuration and Management” Course as an Example
(Articles)
Fang Hu
,
Shijun Che
Open Access Library Journal
Vol.6 No.8
,August 23, 2019
DOI:
10.4236/oalib.1105684
420
Downloads
1,299
Views
Citations
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
(Articles)
Aljwhrh Almtrf
,
Mohamed Zohdy
Journal of Computer and Communications
Vol.7 No.12
,December 16, 2019
DOI:
10.4236/jcc.2019.712005
697
Downloads
1,690
Views
Citations
Unveiling Insider Threats: Examining Vulnerabilities in an Organizational Structure: A Case Study of NamPost
(Articles)
Iyaloo N. Waiganjo
,
Linekela S. Nandjenda
Open Access Library Journal
Vol.12 No.1
,January 8, 2025
DOI:
10.4236/oalib.1112797
11
Downloads
62
Views
Citations
The Package Concept for Enforcing Usage Control
(Articles)
Patricia Ghann
,
Changda Wang
,
Conghua Zhou
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42008
3,095
Downloads
5,832
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top