Under the Wire

March 2007
Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p54
Trade Publication
The article reports on a trend in which universities adopt wireless access control and electronic security systems with smart cards. Wireless systems eliminate the need to run miles of conduit and to install multiple power supplies. Biometric identification is a technology that will expand in use among enterprises. Vendors include PEI Systems Inc. and Sonitrol.


Related Articles

  • Tailor to the Application and Organization.  // SDM: Security Distributing & Marketing;Aug2003, Vol. 33 Issue 8, p52 

    Focuses on the ways of using biometrics to verify the identity of an individual. Biometric access with single door control; Use of Smart card systems to leverage the secure data storage; Integration of biometrics into conventional access control systems.

  • SECURITY WATCH. LORENZI, NEAL // Health Facilities Management;Jan2014, Vol. 27 Issue 1, p31 

    The article reports on innovations for increased safety and security in healthcare facility operations as of January 2014. It states that two access control trends include multipurpose smart cards for providing access control, identification, and time and attendance functionality, and systems...

  • Reading the Future. Hodgson, Karyn // SDM: Security Distributing & Marketing;Jun2013, Vol. 43 Issue 6, p75 

    The article presents information on several developments related reader technologies. It is stated that near field communications (NFC) has a great potential to change the access control card and reader market in the future. North Carolina-based firm Strategic Security Solutions is installing...

  • Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Kumari, Saru; Wu, Fan; Li, Xiong; Farash, Mohammad; Jiang, Qi; Khan, Muhammad; Das, Ashok // Multimedia Tools & Applications;Dec2016, Vol. 75 Issue 24, p17215 

    In recent years, Voice over Internet Protocol (VoIP) has gained more and more popularity as an application of the Internet technology. For various IP applications including VoIP, the topic of Session Initiation Protocol (SIP) has attracted major concern from researchers. SIP is an advanced...

  • A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks. Das, Ashok // Wireless Personal Communications;Jun2015, Vol. 82 Issue 3, p1377 

    Critical applications in wireless sensor network (WSN) are real-time based applications. Therefore, users are generally interested in accessing real-time information. This is possible, if the users (called the external parties) are allowed to access the real-time data directly from the sensor...

  • Access control.  // R&D Magazine;Nov2005, Vol. 47 Issue 11, p15 

    This article presents forecasts on the U.S. electronic access control market for 2005. Electronic access control demand will grow annually through 2009, driven by technological innovation, falling prices, and relatively high crime rates. Biometrics and smart cards will be the fastest growing...

  • Feds eyeing one access model for all. Messmer, Ellen // Network World;9/20/2004, Vol. 21 Issue 38, p1 

    The U.S. federal government has been required to adopt common technology to be used to identify employees and contractors accessing federally controlled networks and buildings. President George W. Bush signed a Homeland Security Presidential Directive that seeks to establish a government...

  • It's All in the Cards. D'Alto, Nick // Odyssey;Oct2007, Vol. 16 Issue 7, p36 

    The article presents information on the use of smart cards in biometric systems in the U.S.

  • Modeling of Authentication System by Vague Expressions. Bani Hashim, Ahmad Yusairi // Journal of Communication & Computer;Nov2011, Vol. 8 Issue 11, p997 

    There is a widespread use of authentication systems. The applications range from home to industrial settings. The knowledge of the technologies is becoming a trade. Any types of security systems are vulnerable to intrusions. Therefore, this study is done to test a technique using unconventional...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics