2020 International Conference on System, Computation, Automation and Networking (ICSCAN) 2020
DOI: 10.1109/icscan49426.2020.9262386
|View full text |Cite
|
Sign up to set email alerts
|

Locality based violation vigilant system using mobile application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Even though RFID is said to be commonly applied in various fields, including security, the data on the card can be retrieved without contact with the RFID card if it is not stored with an RFID blocker. Even with these weaknesses, RFID security is guaranteed on condition that the RFID card is stored wisely (Raman et al, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Even though RFID is said to be commonly applied in various fields, including security, the data on the card can be retrieved without contact with the RFID card if it is not stored with an RFID blocker. Even with these weaknesses, RFID security is guaranteed on condition that the RFID card is stored wisely (Raman et al, 2020).…”
Section: Introductionmentioning
confidence: 99%