[PDF][PDF] 面向数字图书馆的海量信息管理体系结构研究

邢春晓, 曾春, 李超, 周立柱 - 软件学报, 2004 - jos.org.cn
… In Section 2 we review the related works and enabling technologies for supporting high …
to restrict access to objects or services in the digital library. Access management services are …

[PDF][PDF] 醫Future Generation Computer Systems

S Senganº, V Subramaniyaswamy… - Future Generation …, 2020 - researchgate.net
… This research paper aims to review critical challenges addressing … access, wireless
devices, user login credential, etc. For analyzing the security system by investigating the security

針對減輕管理負擔之條件式角色存取控制設計

張宗堯, 黃育綸 - 2008 - ir.lib.nycu.edu.tw
… in addition to the user identities. In this research, we propose a distinctive access control
model that cooperates with … We review the previous proposals of access control and context …

[PDF][PDF] 区块链赋能的6G 零信任车联网可信接入方案

郝敏, 叶东东, 余荣, 王敬宇, 廖建新 - 电子与信息学报, 2022 - jeit.ac.cn
… ", and the trusted and reliable access management scheme of the 6G in-vehicle … authentication
algorithm based on quadratic residual is used to complete the mutual authentication and …

[HTML][HTML] 基於選擇性區塊鏈剪枝之車網安全訊息傳播

WD Jian - 2022 - ir.lib.ncu.edu.tw
… This paper proposes a secure message dissemination mechanism based on selective
blockchain pruning. Blockchain is considered one of the solutions to improve VAENTs …

適用於各種企業應用之高擴充性混合式指紋辨識系統

王偉榕, 王國禎 - 2011 - ir.lib.nycu.edu.tw
… existing approaches are reviewed. Chapter 3 presents the … as time attendance and door
access control, we design an … the overall system performance and reduces the system response …

[HTML][HTML] 透過物聯網和Zenbo 機器人實作智慧翻轉教室並探討其對學生互動和感知影響之研究

皮亞克 - 2020 - ir.lib.ncu.edu.tw
… Intelligent smart home automation and security system using Arduino and Wi-fi.
International Journal of Engineering And Computer Science (IJECS), 6(3), 20694-20698. …

[HTML][HTML] 基于云或区块链的物联网: 比较调查和前进道路

RA Memon - 信息与电子工程前沿(英文), 2022 - fitee.zjujournals.com
… Cloud of Things: integrating Internet of Things and cloud computing and the issues involved.
. … A user authentication scheme of IoT devices using blockchain- enabled fog nodes. . IEEE/…

[PDF][PDF] 电力物联网终端安全防护研究综述

苏盛, 汪干, 刘亮, 陈清清, 王坤 - 高电压技术, 2022 - csee.org.cn
… learning in the security of IoT terminals are reviewed and prospected. Key words:power
internet of things devices; encrypted authentication; data privacy security; time synchronization …

Data Mining for Cyber 𠄁Physical Systems

MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
device administration (CACN) was given in [35]. Creating attentive figuring may be known as
a CACN operating in higher access management … that rely on reviews and past supporting …