메뉴 건너뛰기




Volumn , Issue , 2011, Pages 43-47

An indoor location-based access control system by RFID

Author keywords

authenticate protocol; Computer Netowrk; Cyber Securitys; internet of thing; location based access control; RFID

Indexed keywords

ACCESS CONTROL MECHANISM; ACTIVE TAG; AUTHENTICATE PROTOCOL; CONFIDENTIAL DATA; CYBER SECURITYS; INTERNET OF THING; LOCATION BASED; LOCATION INFORMATION; MOBILE STORAGE; RAPID DEVELOPMENT; REPLAY ATTACK; RF SIGNAL; SECURITY RISKS; SPOOFING ATTACKS;

EID: 80053159537     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CYBER.2011.6011761     Document Type: Conference Paper
Times cited : (9)

References (6)
  • 1
    • 34247380764 scopus 로고    scopus 로고
    • Supporting location based access control policies
    • Ardagna C, Cremonini M, Damiani E, Vimercati S, SamaratiP, "Supporting location based access control policies, " In ASIACCS 2006, 2006, pp 212-222
    • (2006) ASIACCS , vol.2006 , pp. 212-222
    • Ardagna, C.1    Cremonini, M.2    Damiani, E.3    Samaratip, V.S.4
  • 2
    • 68149091583 scopus 로고    scopus 로고
    • A Highly Accurate, Easy-to-Use Location-Based Access Control System
    • Y. Wang, J. Zhao, T. Fukushima, Lock, "A Highly Accurate, Easy-to-Use Location-Based Access Control System, " In LoCA 2009, 2009, pp. 254-270.
    • (2009) LoCA , vol.2009 , pp. 254-270
    • Wang, Y.1    Zhao, J.2    Fukushima Lock, T.3
  • 3
    • 62249144306 scopus 로고    scopus 로고
    • A Statistical Indoor Localization Method for Supporting Location-based Access Control
    • C. Gao, Z. Yu, Y. Wei et. al, "A Statistical Indoor Localization Method for Supporting Location-based Access Control, " in Mobile Netw Appl (2009) 14, pp253-263
    • (2009) Mobile Netw Appl , vol.14 , pp. 253-263
    • Gao, C.1    Yu, Z.2    Wei, Y.3
  • 4
    • 80053146000 scopus 로고    scopus 로고
    • Research on the Indoor Positioning Algorithm Based on RFID
    • B. Yan, C. Jiang, W. Yin, "Research on the Indoor Positioning Algorithm Based on RFID", in Computer Simulation, Vol. 2, 2010, pp 320-324
    • (2010) Computer Simulation , vol.2 , pp. 320-324
    • Yan, B.1    Jiang, C.2    Yin, W.3
  • 6
    • 65349109748 scopus 로고    scopus 로고
    • Reaserch on Hash-Based RFID Security Authenticaton Protocol
    • Z. Ding, J. Li, B. Feng, "Reaserch on Hash-Based RFID Security Authenticaton Protocol, " in Journal of Computer Research and Development, 46(4), 2009, pp 583-592
    • (2009) Journal of Computer Research and Development , vol.46 , Issue.4 , pp. 583-592
    • Ding, Z.1    Li, J.2    Feng, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.