搜索资源列表
A-complete-access-control-system-
- 一 套 完 整 的 门 禁 系 统 ( 原理图 + 源程序 )-A complete access control system (schematic+ source code)
802.11-1999
- Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
802.11-2007
- Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
CPU
- 这是门禁系统CPU原理图,希望能帮助那些需要帮助的人-This is the CPU access control system schematic diagram, hoping to help those in need of help
ICND_12_IP_AccessControlList
- Security IP Access Control List
doc4661
- RFID Based Access Control system
EM4006
- RFID Based Access Control Systems
http___www.cypress
- RFID based access control systems
FingerprintAccessControSystem
- 指纹门禁系统的设计与开发--此文章为研究生毕业设计论文,仅供参考,版权为作者所有,请下载后于24小时内删除-Fingerprint Access Control System Design and Development
access-control-technology
- 介绍了信息安全中访问控制技术定义、访问控制技术策略、自主访问控制、强制访问控制等。-introduce the access control technology in IT security,include discretionary access control(DAC or IBAC) and mandatory access control (MAC) and so on!
Biometrics---Access-Control---Smart-Cards---
- Biometrics Access Control - Smart Cards - A Not So Simple-Biometrics Access Control - Smart Cards - A Not So Simple
Semantic-Web-Access-Control
- A Semantic Web Based Framework for Social Network Access Control 基于Semantic Web的社交网路控制框架-A Semantic Web Based Framework for Social Network Access Control
Access-Control-Scheme-in-Cloud
- :云服务中现有访问控制方案对可信第三方具有强烈依赖性。针对该问题,提出一个基于属性的分布式云访问控制方案。建立云访 问控制模型,采用ABE的加密树方式构造访问控制策略,并给出用户撤销及策略更新方法。安全性分析表明,该方案能够抵抗共谋攻击, 具有数据保密性以及后向前向保密性。-Now existing access control scheme has the strong dependence to trusty third party in cloud.With regard to t
a-Role-Based-Access-Control-Model
- 广义时空中基于角色的访问控制模型的规范,验证和实施。我们展示了如何运用基于UML的规范环境工具去分析一个应用程序的时空访问控制模型。我们提出了一个可以实现我们模型的架构,并提供了一个协议。-Generalized space in role-based access control model specification, verification and implementation. We show how to use UML-based tool to analyze a regulat
Access-Control
- 无线传感器网络中基于使用控制的安全访问方案。在我们的方案中所提出的身份验证协议有几大优势,其中最主要的是它在计算,存储和通信中的耗费都很低。此外,我们的方案还可以执行那些具有属性可变性和决策连续性的访问控制。-Wireless sensor networks based on the use of security access control solutions. In our scenario, the proposed authentication protocol has several
Access-Control-and-Synchronization
- Synchronization and Access control
IC-card-access-control-system-design
- 基于51单片机的刷卡门禁系统。我不知道啊 我只想要资料-Based on 51 single-chip card access control system. I do not know ah I just want information
Decentralized-Access-Control-with-Anonymous-Authe
- Decentralized access project in java
A Multiple Antenna System for RFID Access Control Management
- A Multiple Antenna System for RFID Access Control Management
Cognitive-Adaptive-Medium-Access-Control-(2)
- Cognitive Adaptive Medium Access Controlin Cognitive Radio Sensor Networks Spectrum sensing is an integral part of MAC in CR networks and also an energy-consuming operation. Cognitive adaptive MAC (CAMAC) protocol, supports opportunistic transmiss