咨询与建议

限定检索结果

文献类型

  • 46 篇 会议
  • 35 篇 期刊文献
  • 10 篇 学位论文

馆藏范围

  • 91 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 70 篇 工学
    • 38 篇 计算机科学与技术...
    • 28 篇 电气工程
    • 13 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 核科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 8 篇 理学
    • 3 篇 化学
    • 2 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 3 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 91 篇 access control s...
  • 13 篇 access control
  • 10 篇 authentication
  • 9 篇 face recognition
  • 9 篇 text
  • 7 篇 přístupový systé...
  • 6 篇 authorization
  • 5 篇 feature extracti...
  • 5 篇 security
  • 5 篇 rfid
  • 4 篇 authorisation
  • 3 篇 microcontroller
  • 3 篇 acs
  • 3 篇 policies
  • 3 篇 mobile cloudlet
  • 3 篇 nfc
  • 3 篇 speech recogniti...
  • 3 篇 security system
  • 3 篇 cloud computing
  • 3 篇 integrated secur...

机构

  • 10 篇 brno university ...
  • 2 篇 singapore univ t...
  • 2 篇 st petersburg el...
  • 1 篇 saint-petersburg...
  • 1 篇 indian inst info...
  • 1 篇 brno univ techno...
  • 1 篇 shanghai univ ke...
  • 1 篇 college of econo...
  • 1 篇 spiiras 39 14th ...
  • 1 篇 spectrum technol...
  • 1 篇 jaypee univ info...
  • 1 篇 multimedia univ ...
  • 1 篇 nanjing univ inf...
  • 1 篇 sapienza univ ro...
  • 1 篇 gibio universida...
  • 1 篇 school of inform...
  • 1 篇 vienna univ tech...
  • 1 篇 manchester metro...
  • 1 篇 fac elect engn o...
  • 1 篇 zhejiang univ st...

作者

  • 2 篇 huang yongfeng
  • 2 篇 sammarco e.
  • 2 篇 shu yuanchao
  • 2 篇 tu shanshan
  • 2 篇 cheong soon-nyea...
  • 2 篇 garzia f.
  • 2 篇 ling huo-chong
  • 2 篇 chen jiming
  • 2 篇 cusani r.
  • 1 篇 maebara sunao
  • 1 篇 huang huang-nan
  • 1 篇 steingart viktor
  • 1 篇 dong hoon lee
  • 1 篇 a. ivanova
  • 1 篇 jing ning
  • 1 篇 xueyan cao
  • 1 篇 jin zhixiang
  • 1 篇 aswir premadi
  • 1 篇 ibeke ebuka
  • 1 篇 iwendi celestine

语言

  • 89 篇 英文
  • 2 篇 其他
检索条件"主题词=Access Control System"
91 条 记 录,以下是11-20 订阅
排序:
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
收藏 引用
EXPERT systemS WITH APPLICATIONS 2014年 第7期41卷 3561-3568页
作者: Cheong, Soon-Nyean Ling, Huo-Chong Teh, Pei-Lee Multimedia Univ Fac Engn Cyberjaya 63100 Selangor Malaysia Monash Univ Sch Business Sunway 46150 Selangor Malaysia
The revolutionary development of smartphone which offers compelling computing and storage capabilities has radically changed the digital lifestyles of users. The integration of Near Field Communication (NFC) into smar... 详细信息
来源: 评论
Face Detection-Induced access control system via Large Margin Metric Learning
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED systemS AND TECHNOLOGIES 2022年 第3期13卷 1-11页
作者: Pu, Li'e Sun, Jialin Yunnan Land & Resources Vocat Coll Kunming Yunnan Peoples R China
With the development of science and technology and the acceleration of economic integration, identity authentication has become the most basic element in cyberspace and the basis of the whole information security syst... 详细信息
来源: 评论
The Construction and Realization of Digital-campus-based Multimedia access control system  4
The Construction and Realization of Digital-campus-based Mul...
收藏 引用
2015 International Conference of Educational Innovation Through Technology - (EITT)
作者: Lu, Haigang Nanjing Univ Informat Sci & Technol Modern Educ Technol Ctr Nanjing Jiangsu Peoples R China
controlling access to multimedia lecterns is an important yet complicated part of multimedia teaching management. Traditional measures are problematic in many ways. For instance, manual unlocking is human costly;ID ca... 详细信息
来源: 评论
Scalability analysis of the OpenAM access control system with the Universal Scalability Law  2
Scalability analysis of the OpenAM access control system wit...
收藏 引用
2nd International Conference on Future Internet of Things and Cloud (FiCloud)
作者: Heyman, Thomas Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven IMinds DistriNet B-3001 Leuven Belgium
The scalability of a software system is greatly impacted by the scalability of the underlying access control system, which makes analyzing the scalability of that access control system paramount. However, this is not ... 详细信息
来源: 评论
CDcontroller: A Cloud Data access control system based on Reputation  17
CDController: A Cloud Data Access Control System based on Re...
收藏 引用
17th IEEE International Conference on Computer and Information Technology (CIT) / IEEE Int Workshop on Secure and Resource-Efficient Edge Computing (SecureEdge) / IEEE Int Symposium on Recent Advances of Computer and Information Technologies (RACIT)
作者: Lin, Huaqing Yan, Zheng Kantola, Raimo Xidian Univ Sch Cyber Engn State Key Lab Integrated Serv Networks Xian Shaanxi Peoples R China Aalto Univ Dept Commun & Networking Espoo Finland
The rapid development of cloud computing is changing the way of service provision, data usage and sharing over the Internet. Cloud data privacy and security protection is a crucial issue that impacts the success of cl... 详细信息
来源: 评论
THE DESIGN OF access control system BASED ON DYNAMIC AUDIO TOKEN  5
THE DESIGN OF ACCESS CONTROL SYSTEM BASED ON DYNAMIC AUDIO T...
收藏 引用
5th International Conference on Audio, Language and Image Processing (ICALIP)
作者: Sha, Yangyang Wan, Wanggen Li, Zhongbin Kong, Deke Chen, Haoyu Shanghai Univ Sch Commun & Informat Engn Shanghai Peoples R China Shanghai Univ Inst Smart City Shanghai 200444 Peoples R China
access control system is evolved from the traditional lock, as the name suggests, it is used to regulate the entrance channel. Password access control system, contactless card access control system and fingerprint acc... 详细信息
来源: 评论
A Smart access control system based on ARM
A Smart Access Control System based on ARM
收藏 引用
2nd International Conference on Applied Materials and Electronics Engineering (AMEE 2013)
作者: Tian, Yingzhong Jin, Zhixiang Wang, Shuai Xu, Yang Zhang, Ming Shanghai Univ Key Lab Mfg Automat & Robot Sch Mechatron Engn & Automat Shanghai 200072 Peoples R China
As the schools become more and more open today, how to manage the whole school is becoming a great problem. access control system needs development to adapt the tendency. Cost saving is also need in the smart access c... 详细信息
来源: 评论
access control system Based Cloudlet and ABE on Mobile Cloud
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2016年 第7期17卷 1443-1451页
作者: Tu, Shanshan Huang, Yongfeng Magurawalage, Chathura M. Sarathchandra Peng, Lin Zhou, Zhili Beijing Univ Technol BJUT Fac Informat Technol Beijing Peoples R China Tsinghua Univ Dept Elect Engn Beijing Peoples R China Univ Essex Dept Comp Sci & Elect Engn Colchester CO4 3SQ Essex England Yunnan Agr Univ Coll Basic Sci & Informat Engn Kunming Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Nanjing Jiangsu Peoples R China
Be different from traditional Attribute-Based Encryption (ABE) access control systems for cloud computing, this paper first proposes a new access architecture on mobile cloud, which introduces a middle layer sitting b... 详细信息
来源: 评论
Physical access control system for the Premises using the Internet of Things Technology  9
Physical Access Control System for the Premises using the In...
收藏 引用
9th Mediterranean Conference on Embedded Computing (MECO)
作者: Sovetov, B. Ya Tatarnikova, T. M. Cehanovsky, V. V. St Petersburg Electrotech Univ LETI St Petersburg Russia
A comprehensive solution to the construction of a room access control system is proposed. Complexity is realized by choosing the platform of the technology of the Internet of things. A review of modern microcontroller... 详细信息
来源: 评论
Integrated access control system for ports
Integrated access control system for ports
收藏 引用
3rd International Conference on Safety and Security Engineering
作者: Garzia, F. Sammarco, E. Cusani, R. SAPIENZA Univ Rome INFOCOM Dept Rome Italy Gen Direct Safety Secur & Civil Protect Rome Italy
The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is nece... 详细信息
来源: 评论