[PDF][PDF] 面向数字图书馆的海量信息管理体系结构研究
邢春晓, 曾春, 李超, 周立柱 - 软件学报, 2004 - jos.org.cn
… In Section 2 we review the related works and enabling technologies for supporting high …
to restrict access to objects or services in the digital library. Access management services are …
to restrict access to objects or services in the digital library. Access management services are …
[PDF][PDF] 醫Future Generation Computer Systems
S Senganº, V Subramaniyaswamy… - Future Generation …, 2020 - researchgate.net
… This research paper aims to review critical challenges addressing … access, wireless
devices, user login credential, etc. For analyzing the security system by investigating the security …
devices, user login credential, etc. For analyzing the security system by investigating the security …
針對減輕管理負擔之條件式角色存取控制設計
張宗堯, 黃育綸 - 2008 - ir.lib.nycu.edu.tw
… in addition to the user identities. In this research, we propose a distinctive access control
model that cooperates with … We review the previous proposals of access control and context …
model that cooperates with … We review the previous proposals of access control and context …
[PDF][PDF] 区块链赋能的6G 零信任车联网可信接入方案
郝敏, 叶东东, 余荣, 王敬宇, 廖建新 - 电子与信息学报, 2022 - jeit.ac.cn
… ", and the trusted and reliable access management scheme of the 6G in-vehicle … authentication
algorithm based on quadratic residual is used to complete the mutual authentication and …
algorithm based on quadratic residual is used to complete the mutual authentication and …
[HTML][HTML] 基於選擇性區塊鏈剪枝之車網安全訊息傳播
WD Jian - 2022 - ir.lib.ncu.edu.tw
… This paper proposes a secure message dissemination mechanism based on selective
blockchain pruning. Blockchain is considered one of the solutions to improve VAENTs …
blockchain pruning. Blockchain is considered one of the solutions to improve VAENTs …
適用於各種企業應用之高擴充性混合式指紋辨識系統
王偉榕, 王國禎 - 2011 - ir.lib.nycu.edu.tw
… existing approaches are reviewed. Chapter 3 presents the … as time attendance and door
access control, we design an … the overall system performance and reduces the system response …
access control, we design an … the overall system performance and reduces the system response …
[HTML][HTML] 透過物聯網和Zenbo 機器人實作智慧翻轉教室並探討其對學生互動和感知影響之研究
皮亞克 - 2020 - ir.lib.ncu.edu.tw
… Intelligent smart home automation and security system using Arduino and Wi-fi.
International Journal of Engineering And Computer Science (IJECS), 6(3), 20694-20698. …
International Journal of Engineering And Computer Science (IJECS), 6(3), 20694-20698. …
[HTML][HTML] 基于云或区块链的物联网: 比较调查和前进道路
RA Memon - 信息与电子工程前沿(英文), 2022 - fitee.zjujournals.com
… Cloud of Things: integrating Internet of Things and cloud computing and the issues involved.
. … A user authentication scheme of IoT devices using blockchain- enabled fog nodes. . IEEE/…
. … A user authentication scheme of IoT devices using blockchain- enabled fog nodes. . IEEE/…
[PDF][PDF] 电力物联网终端安全防护研究综述
苏盛, 汪干, 刘亮, 陈清清, 王坤 - 高电压技术, 2022 - csee.org.cn
… learning in the security of IoT terminals are reviewed and prospected. Key words:power
internet of things devices; encrypted authentication; data privacy security; time synchronization …
internet of things devices; encrypted authentication; data privacy security; time synchronization …
Data Mining for Cyber 𠄁Physical Systems
MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
… device administration (CACN) was given in [35]. Creating attentive figuring may be known as
a CACN operating in higher access management … that rely on reviews and past supporting …
a CACN operating in higher access management … that rely on reviews and past supporting …