2015
DOI: 10.1007/978-3-319-13117-7_205
|View full text |Cite
|
Sign up to set email alerts
|

Using NFC Technology for Monitoring Patients and Identification Health Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…It operates within the radio frequency of 13.56 MHz, has bandwidth speeds up to 424 kbits/s, and is heavily customer-oriented with a variety of mobile devices already supporting it (Lopez et al, 2013; Shah and Yaqoob, 2016). Vasquez et al (2015) used NFC technology for a system to correctly identify and monitor the health patients in hospitals and health-related centres for better tracking and control. Another example of NFC being useful is in Halevi et al (2012) where the proximity was explored to provide secure validation on transactions by using NFC featured mobile phones alongside its ambient sensors (audio and light).…”
Section: Iot Solutions For Ce and Traceabilitymentioning
confidence: 99%
“…It operates within the radio frequency of 13.56 MHz, has bandwidth speeds up to 424 kbits/s, and is heavily customer-oriented with a variety of mobile devices already supporting it (Lopez et al, 2013; Shah and Yaqoob, 2016). Vasquez et al (2015) used NFC technology for a system to correctly identify and monitor the health patients in hospitals and health-related centres for better tracking and control. Another example of NFC being useful is in Halevi et al (2012) where the proximity was explored to provide secure validation on transactions by using NFC featured mobile phones alongside its ambient sensors (audio and light).…”
Section: Iot Solutions For Ce and Traceabilitymentioning
confidence: 99%
“…Some advantages are: Scope and availability to be integrated into each of the phones in the world, easy to use, information security, etc. Some disadvantages are: Applications must use cryptographic protocols to a higher layer to establish a secure channel; the storage capacity of tags is limited so you must think well the use that would be given to them within a certain field [5][6][7].…”
Section: Radio Frequency Identification(rfid)mentioning
confidence: 99%
“…Other identification technologies have emerged including some wireless proposal, such as Radio Frequency Identification (RFID) and Near Field Communication (NFC) that is classified as an evolution of RFID and that can make an adequate management of some security features and standards within the range of existing applications [5,6]. Security features were studied by Alzahrani et al introducing a new classification of NFC system attacks using a novel multidimensional representation [7].…”
Section: Introductionmentioning
confidence: 99%
“…As a method for reducing the costs of health services, studies have been initiated to reduce the permanence, or views, of patients to institutions in the sector, using remote monitoring of patients [8] [9] [10].…”
Section: A Near Field Communication (Nfc )mentioning
confidence: 99%