{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:39:35Z","timestamp":1725766775893},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.50","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"page":"396-403","source":"Crossref","is-referenced-by-count":2,"title":["An Application Security Framework for Near Field Communication"],"prefix":"10.1109","author":[{"given":"Dirar","family":"Abu-Saymeh","sequence":"first","affiliation":[]},{"given":"Dhiah el Diehn I.","family":"Abou-Tair","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Zmily","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/WAINA.2011.36"},{"key":"17","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48157-5_22","article-title":"Token-based access to digital information","author":"holmquist","year":"1999","journal-title":"The 1st International Symposium on Handheld and Ubiquitous Computing"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/ICICIC.2009.158"},{"year":"0","journal-title":"CardShake(business Card NFC)-Android Apps on Google Play","key":"15"},{"year":"0","journal-title":"NFC at the Museum of London","key":"16"},{"year":"0","journal-title":"WifiTap WiFi NFC-Android Apps on Google Play","key":"13"},{"year":"0","journal-title":"Tap2Share-NFC Cards and Contacts-Android Apps on Google Play","key":"14"},{"year":"0","journal-title":"Tap & Go with MasterCard PayPass","key":"11"},{"year":"0","journal-title":"NFC Doors Revolutionising Home Security","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/2428955.2429004"},{"key":"20","first-page":"463","article-title":"Graphical passwords: A survey","author":"suo","year":"2005","journal-title":"the 21st Annual Computer Security Applications Conference"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/1593254.1593276"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1007\/s00779-011-0436-7"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/2046582.2046591"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1007\/978-3-642-34528-9_37"},{"key":"26","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1145\/1854099.1854142","article-title":"Securing rfidbased authentication systems using parsekey+","author":"rahnama","year":"2010","journal-title":"The 3rd International Conference on Security of Information and Networks"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1007\/s11036-009-0209-y"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1007\/978-3-642-33383-5_5"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/ICT4M.2010.5971895"},{"year":"2012","journal-title":"NFC Mobile Payment Transaction Spend to Hit the $100 Billion Mark in 2016","key":"3"},{"year":"2012","journal-title":"NFC ICs and Devices","key":"2"},{"year":"0","journal-title":"Porticus Technology Inc and Aftek Announce VoiceKeyID for Android Platform Mobile Security Application for Google Android Appstore","key":"10"},{"year":"2011","journal-title":"Key Global Telecom Indicators for the World Telecommunication Service Sector","key":"1"},{"year":"0","journal-title":"Android SDK for Android Developers","key":"7"},{"year":"0","journal-title":"Google Nexus","key":"6"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/78.80876"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/PROC.1985.13345"},{"year":"0","journal-title":"Android-Introducing Ice Cream Sandwich","key":"9"},{"year":"0","journal-title":"Enable A Fingerprint Scanner for Android on the Motorola ATRIX 4G","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680867.pdf?arnumber=6680867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T03:40:59Z","timestamp":1688874059000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.50","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}