|
Volumn , Issue , 2011, Pages 43-47
|
An indoor location-based access control system by RFID
|
Author keywords
authenticate protocol; Computer Netowrk; Cyber Securitys; internet of thing; location based access control; RFID
|
Indexed keywords
ACCESS CONTROL MECHANISM;
ACTIVE TAG;
AUTHENTICATE PROTOCOL;
CONFIDENTIAL DATA;
CYBER SECURITYS;
INTERNET OF THING;
LOCATION BASED;
LOCATION INFORMATION;
MOBILE STORAGE;
RAPID DEVELOPMENT;
REPLAY ATTACK;
RF SIGNAL;
SECURITY RISKS;
SPOOFING ATTACKS;
CONTROL SYSTEMS;
CRYPTOGRAPHY;
INTELLIGENT SYSTEMS;
INTERNET PROTOCOLS;
RADIO FREQUENCY IDENTIFICATION (RFID);
VIRTUAL STORAGE;
AUTHENTICATION;
|
EID: 80053159537
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CYBER.2011.6011761 Document Type: Conference Paper |
Times cited : (9)
|
References (6)
|