Results 291 to 298 of about 252,498 (298)
Some of the next articles are maybe not open access.
Attribute-based authorization for structured Peer-to-Peer (P2P) networks
Computer Standards and Interfaces, 2015Diego SuÁrez Touceda +2 more
exaly
Outcomes of EMA marketing authorization applications: does partnering have an influence?
Nature Reviews Drug Discovery, 2014exaly
DiSAuth: A DNS-based secure authorization framework for protecting data decoupled from applications
Computer NetworksYing Li
exaly
Consistency analysis of authorization hook placement in the Linux security modules framework
ACM Transactions on Information and System Security, 2004exaly
Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing
IEEE Transactions on Network and Service ManagementShalitha Wijethilaka +2 more
exaly

