{"id":"https://openalex.org/W3110536312","doi":"https://doi.org/10.3233/faia200803","title":"Ad-Hoc Network Access Control System and Method for Edge NFC Terminal","display_name":"Ad-Hoc Network Access Control System and Method for Edge NFC Terminal","publication_year":2020,"publication_date":"2020-12-02","ids":{"openalex":"https://openalex.org/W3110536312","doi":"https://doi.org/10.3233/faia200803","mag":"3110536312"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200803","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200803","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200803","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060973601","display_name":"Yi-qin BAO","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128418","display_name":"Nanjing Xiaozhuang University","ror":"https://ror.org/03fnv7n42","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210128418"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiqin Bao","raw_affiliation_strings":["College of Information Engineering of Nanjing XiaoZhuang University, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering of Nanjing XiaoZhuang University, China","institution_ids":["https://openalex.org/I4210128418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039281701","display_name":"Zhengtang Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengtang Sun","raw_affiliation_strings":["School of computer science and technology of Heilongjiang University, China"],"affiliations":[{"raw_affiliation_string":"School of computer science and technology of Heilongjiang University, China","institution_ids":["https://openalex.org/I1300757298"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":60},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9941,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9932,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6977167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.63453954},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6344555},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.5026047},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4740272},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4517181},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.40583986},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3239636},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18439919},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10839683},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08083892},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200803","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200803","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200803","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200803","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":6,"referenced_works":["https://openalex.org/W2048890622","https://openalex.org/W2295760569","https://openalex.org/W2375311420","https://openalex.org/W2796139530","https://openalex.org/W2990001202","https://openalex.org/W3034161988"],"related_works":["https://openalex.org/W3023964565","https://openalex.org/W2526209010","https://openalex.org/W2383860150","https://openalex.org/W2364307956","https://openalex.org/W2362468486","https://openalex.org/W2350037705","https://openalex.org/W2072517583","https://openalex.org/W2024568155","https://openalex.org/W1996683534","https://openalex.org/W1658613573"],"abstract_inverted_index":{"With":[0],"the":[1,37,39,43,47,74,111,120,136,147,161],"rapid":[2],"development":[3],"of":[4,46,67,95,138,166],"wireless":[5,117],"communication":[6,10],"technology,":[7],"Near":[8],"field":[9],"(NFC)":[11],"and":[12,24,64,85,93,153,164],"Ad-Hoc":[13,148],"network":[14,149],"(ZigBee)":[15],"have":[16],"attracted":[17],"wide":[18],"attention":[19],"for":[20,113,155],"their":[21],"security,":[22],"speed":[23],"low":[25],"power":[26],"consumption.":[27],"NFC":[28,84,103,157],"has":[29],"been":[30],"used":[31],"in":[32,56,61],"access":[33,68,79,91,139,150,168],"control":[34,45,80,92,140,151],"research.":[35],"In":[36,70],"past,":[38],"system":[40,81,97,152],"only":[41],"considered":[42],"switch":[44],"door":[48],"lock,":[49],"but":[50],"could":[51],"not":[52],"achieve":[53],"safety":[54],"management":[55,112,162],"large":[57],"building":[58,167],"scenarios,":[59],"resulting":[60],"security":[62,137,165],"loopholes":[63],"poor":[65],"maintenance":[66],"control.":[69,169],"order":[71],"to":[72,110],"solve":[73],"above":[75],"problems,":[76],"Automatic":[77],"networking":[78],"based":[82],"on":[83],"ZigBee":[86,109],"technology":[87],"is":[88,106,141],"implemented.":[89],"The":[90,116],"Internet":[94],"Things":[96],"(IoT)":[98],"are":[99],"fused":[100],"through":[101,108],"NFC.":[102],"identity":[104,114],"information":[105],"transmitted":[107],"authentication.":[115],"transmission":[118],"adopts":[119],"improved":[121],"reduced":[122],"AES":[123],"advanced":[124],"encryption":[125],"algorithm":[126],"R-AES,":[127],"which":[128],"ensures":[129],"reliable":[130],"data":[131],"transmission.":[132],"On":[133],"this":[134],"basis,":[135],"realized.":[142],"Practical":[143],"results":[144],"show":[145],"that":[146],"method":[154],"edge":[156],"terminal":[158],"can":[159],"improve":[160],"efficiency":[163]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3110536312","counts_by_year":[],"updated_date":"2024-12-25T08:34:02.518910","created_date":"2020-12-07"}
  NODES
INTERN 1