Encrypted quick response scheme for hotel check-in and access control system
The unpleasant experience of long queue while waiting to check-in at hotel is a common problem faced by guests especially during holidays. As such, various self-service technologies (SSTs) were introduced over the years by researchers with the aim to increase the avenues of checking-in guests. Self-...
| Main Authors: | Cheong, S., Ling, Huo Chong, Teh, P., Ahmed, P., Yap, W. |
|---|---|
| Format: | Journal Article |
| Published: |
SAGE PUBLICATIONS INC
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/59865 |
Similar Items
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
Going keyless for a seamless experience: Insights from a unified hotel access control system
by: Lim, W., et al.
Published: (2018)
by: Lim, W., et al.
Published: (2018)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Interactive of quick response (QR) technology in learning session
by: Hiew, Poh Ling
Published: (2014)
by: Hiew, Poh Ling
Published: (2014)
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015)
by: Salam, M., et al.
Published: (2015)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
The development of kit system for honey quality quick check from different species of stingless bee honey in Malaysia
by: Ajit, Azilah
Published: (2017)
by: Ajit, Azilah
Published: (2017)
Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
by: Teh, P., et al.
Published: (2015)
by: Teh, P., et al.
Published: (2015)
Rabin-p encryption scheme analysis on MQTT
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
On the underlying hard lattice problems of GGH encryption scheme
by: Mandangan, Arif, et al.
Published: (2018)
by: Mandangan, Arif, et al.
Published: (2018)
The development of quick response manufacturing in supply chains activities based on product planning control
by: Siti Nursuhailah, Md Suhaidin, et al.
Published: (2022)
by: Siti Nursuhailah, Md Suhaidin, et al.
Published: (2022)
Quick response manufacturing and ergonomic consequences in
manufacturing environment
by: Nelfiyanti, ., et al.
Published: (2020)
by: Nelfiyanti, ., et al.
Published: (2020)
Quick Start
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Accessing hotel responsiveness towards guest's email query: cases in Malaysia
by: Anuar, Jazira, et al.
Published: (2011)
by: Anuar, Jazira, et al.
Published: (2011)
Musculoskeletal discomfort evaluation using Rapid Entire Body Assessment (REBA) and Quick Exposure Check (QEC) among woodworking workers in Selangor, Malaysia
by: Mohd Hawari, Nurhanisah, et al.
Published: (2022)
by: Mohd Hawari, Nurhanisah, et al.
Published: (2022)
Adoption and impact of quick response manufacturing across industry sector
by: N., Nelfiyanti, et al.
Published: (2025)
by: N., Nelfiyanti, et al.
Published: (2025)
Slow, slow, quick, quick, slow: retrospective conversion at the University of Nottingham
by: Wharton, Janet
Published: (2011)
by: Wharton, Janet
Published: (2011)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
PHS Quick Guide
by: Perpustakaan, Hamzah Sendut
Published: (2014)
by: Perpustakaan, Hamzah Sendut
Published: (2014)
The quick and the dead: Behavioral plasticity of anti-predator responses in an Endangered mammal
by: Harrison, N.D., et al.
Published: (2025)
by: Harrison, N.D., et al.
Published: (2025)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
Double random phase encryption scheme to multiplex and simultaneous encode multiple images
by: Alfalou, A., et al.
Published: (2009)
by: Alfalou, A., et al.
Published: (2009)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
Elimination of Fixed Checkin/Check-Out Time as a Source of Entrepreneurial Edge in Hotel Business
by: Uzonna Joseph, Onyemeh
Published: (2013)
by: Uzonna Joseph, Onyemeh
Published: (2013)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
#Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs
by: Moyle, L., et al.
Published: (2019)
by: Moyle, L., et al.
Published: (2019)
Performance Comparison of Encryption Algorithm in CPU and GPU Platform
by: Cheong, Hon Sang
Published: (2015)
by: Cheong, Hon Sang
Published: (2015)
Health risk of quick fixes
by: Ariffin, Ashiqin
Published: (2022)
by: Ariffin, Ashiqin
Published: (2022)
Vehicle Check-In & Check-Out Management System (VCCMS)
by: Nuramira Natasha, Zainuddin
Published: (2023)
by: Nuramira Natasha, Zainuddin
Published: (2023)
Similar Items
-
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014) -
Going keyless for a seamless experience: Insights from a unified hotel access control system
by: Lim, W., et al.
Published: (2018) -
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007) -
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009) -
Interactive of quick response (QR) technology in learning session
by: Hiew, Poh Ling
Published: (2014)