共 50 条
- [2] Evaluation of ticket-based access control method applied to IoT data distribution [J]. IEICE COMMUNICATIONS EXPRESS, 2022, 11 (03): : 148 - 153
- [4] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060
- [6] Table-based recursive method for function evaluation [J]. NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, 2007, 936 : 511 - +
- [7] Table-based Method for Reconfigurable Function Evaluation [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 1224 - +
- [8] Access Control Method using Electrocardiogram Signal for Fog Computing Security [J]. PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1772 - 1777
- [10] Indoor Access Control System Through Symptomatic Examination Using IoT Technology, Fog Computing and Cloud Computing [J]. HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2022, 2022, 13469 : 60 - 72