Search for persons
X
?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies ,
6
Generating Secure Images for CAPTCHAs through Noise Additio:
, In:
?
Proceedings of the 17th ACM symposium on Access Control Models and Technologies ,
7
Analyzing temporal role based access control models:
, In:
?
2022 Global Energy Conference (GEC) ,
9