2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics 2015
DOI: 10.1109/ihmsc.2015.227
|View full text |Cite
|
Sign up to set email alerts
|

An Access Control and Positioning Security Management System Based on RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…These methods are used, for example, to control access for vehicles [182] and healthcare environments [182]. Equally important are management systems for applying access control and positioning security [183]. The systems offer different authentication and access control methods that need to be analyzed to guarantee their safe application in different environments [184].…”
Section: Access Controlmentioning
confidence: 99%
“…These methods are used, for example, to control access for vehicles [182] and healthcare environments [182]. Equally important are management systems for applying access control and positioning security [183]. The systems offer different authentication and access control methods that need to be analyzed to guarantee their safe application in different environments [184].…”
Section: Access Controlmentioning
confidence: 99%
“…In a hospital environment, it is important to consider data protection, that is anonymity of the people, as well as accurate detection of people whether they are as individuals or in groups. Prior research work has proposed the use of various technologies such as Radio Frequency Identification (RFID) [6], [8], Wi-Fi [9] and sensor networks [10], [11], [12], [13] to monitor occupancy.…”
Section: Overview Of People Counting Technologiesmentioning
confidence: 99%
“…It is widely used for identity documents, access control systems, supply chain, inventory tracking, car-charging and production. In areas such as control and asset management, it has become an indispensable component of residential, banking, factories, libraries and other systems [13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%