Access control

Results: 10445



#Item
781Media access control / Radio resource management / Wireless networking / Wireless sensor network / Code division multiple access / Multiplexing / Channel access method / Sensor node / Wireless ad hoc network / Channel / Throughput / Time division multiple access

Performance Evaluation of CDMA-based Wireless Sensor Networks with Long-Thin Topologies Ming-Wei Hsu and Hsin-Mu Tsai Department of Computer Science and Information Engineering National Taiwan University, Taipei 10617, T

Add to Reading List

Source URL: www.csie.ntu.edu.tw

Language: English - Date: 2014-04-10 23:39:39
782Computer access control / HTTP cookie / Authentication / POA

PDF Document

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2009-04-16 04:29:53
783Wireless sensor network / Sensors / Wireless networking / Geographic information systems / Sensor web / Sensor node / Semantic Sensor Web / Sensor Media Access Control

Report from the First Workshop on Geo Sensor Networks S. Nittel∗, A. Stefanidis†, I. Cruz, M. Egenhofer, D. Goldin, A. Howard, A. Labrinidis S. Madden, A. Voisard, M. Worboys Portland, ME, OctUniversity of

Add to Reading List

Source URL: silvianittel.files.wordpress.com

Language: English - Date: 2016-07-10 13:03:20
784Computer network security / Wireless networking / Content-control software / Digital rights management / Internet censorship / Wi-Fi / Computer network / Computer security / Internet access / Emmet / Wireless network / Internet

The Emmet O’Neal Library

Add to Reading List

Source URL: www.eolib.org

Language: English - Date: 2009-10-09 14:19:02
785Analysis of algorithms / Cache / Oblivious ram / Digital signature

2015 IEEE Symposium on Security and Privacy Privacy and Access Control for Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schr¨oder Saarland University & CISPA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:16
786Access control / Fob / Key / Authorization

IIGB Genomics Building/Keen Hall FOB/Key Authorization Form Page 1 PI Name:

Add to Reading List

Source URL: genomics.ucr.edu

Language: English - Date: 2015-10-21 15:20:03
787Gemalto / Secure communication / Cryptography / Computer access control / Computer security / Authentication / Smart card / Online banking / GlobalSign / Gemalto M2M

ROAD TOWARDS MOBILE CREDENTIALS Bring value to students’ life with security Bertrand Michaux April 2016

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
788Crime prevention / Cryptography / Information governance / National security / Computer access control / Illinois National Bank / Computer security / Authorization

BANNER INB SECURITY REQUEST FORM New INB User Access Verification Requested by (supervisor name)_________________________________________________ Department_______________________________Phone/Ext:_______________________

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2016-01-20 10:15:05
789Richard Nixon / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Privacy / Personally identifiable information / Email / Checkers speech

Donor Privacy Policy The Richard Nixon Foundation is committed to ensuring the privacy of your personal information, such as your full name, address, e-mail address, telephone number or other identifying information. Why

Add to Reading List

Source URL: nixonfoundation.org

Language: English - Date: 2015-04-09 19:22:01
790IBM software / Resource Access Control Facility / Z/OS / CICS / MVS / VM / ISPF

z/OS V1R5.0 Security Server RACF Command Language Reference

Add to Reading List

Source URL: publibz.boulder.ibm.com

Language: English - Date: 2004-04-20 16:35:51
UPDATE