{"id":"https://openalex.org/W2125806191","doi":"https://doi.org/10.1109/trustcom.2013.50","title":"An Application Security Framework for Near Field Communication","display_name":"An Application Security Framework for Near Field Communication","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2125806191","doi":"https://doi.org/10.1109/trustcom.2013.50","mag":"2125806191"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009555771","display_name":"D.S. Abu-Saymeh","orcid":null},"institutions":[{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Dirar Abu-Saymeh","raw_affiliation_strings":["Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan","institution_ids":["https://openalex.org/I230091363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025770101","display_name":"Dhiah el Diehn I. Abou-Tair","orcid":"https://orcid.org/0000-0002-8643-5392"},"institutions":[{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Dhiah el Diehn I. Abou-Tair","raw_affiliation_strings":["Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan","institution_ids":["https://openalex.org/I230091363"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036648922","display_name":"Ahmad Zmily","orcid":null},"institutions":[{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad Zmily","raw_affiliation_strings":["Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan"],"affiliations":[{"raw_affiliation_string":"Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan","institution_ids":["https://openalex.org/I230091363"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.194,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.488893,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":78},"biblio":{"volume":null,"issue":null,"first_page":"396","last_page":"403"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9917,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near Field Communication","score":0.7834523}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81855005},{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.7834523},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.72620475},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7104578},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6837493},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.6454921},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5427312},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19657242},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1149883},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.092537254},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1734119465","https://openalex.org/W1985501559","https://openalex.org/W2007524456","https://openalex.org/W2033264603","https://openalex.org/W2039277150","https://openalex.org/W2040266692","https://openalex.org/W2065923742","https://openalex.org/W2088078492","https://openalex.org/W2099826015","https://openalex.org/W2122445585","https://openalex.org/W2130039513","https://openalex.org/W2138835393","https://openalex.org/W2155194384","https://openalex.org/W2161032904","https://openalex.org/W2225773841"],"related_works":["https://openalex.org/W2656445685","https://openalex.org/W2604111946","https://openalex.org/W2489575104","https://openalex.org/W2390951296","https://openalex.org/W2387170932","https://openalex.org/W2334132695","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W143386018","https://openalex.org/W1004582678"],"abstract_inverted_index":{"Smart":[0],"phones":[1],"equipped":[2],"with":[3],"Near":[4],"Field":[5],"Communication":[6],"(NFC)":[7],"provide":[8],"a":[9,84,116,154],"simple":[10],"way":[11],"to":[12,23,52,174],"initiate":[13],"contactless":[14],"transactions":[15,40,97],"and":[16,33,94,129,147,150],"data":[17],"exchange":[18],"without":[19],"having":[20],"the":[21,42,49,75,101,107,111,137,157,163,172,177,185],"need":[22,173],"carry":[24],"additional":[25],"items":[26],"such":[27,121],"as":[28,122],"credit":[29],"cards,":[30],"personal":[31],"IDs,":[32],"access":[34],"keys.":[35],"To":[36],"prevent":[37],"unauthorized":[38],"NFC":[39,70,79,96,168,181,189],"in":[41],"case":[43,155],"of":[44,77,87,110,118,187],"lost":[45],"or":[46],"stolen":[47],"devices,":[48],"user":[50,92,144,178],"needs":[51],"be":[53],"authenticated":[54],"before":[55],"each":[56],"transaction,":[57],"which":[58],"adds":[59],"extra":[60],"burden":[61],"on":[62,91,143,162],"users.":[63],"In":[64,132],"this":[65],"paper":[66],"we":[67,134],"propose":[68,135],"an":[69],"security":[71,89,104,139,169],"framework":[72,82,114,158,170],"that":[73],"simplifies":[74],"initiation":[76],"secure":[78],"transactions.":[80],"The":[81,113,167],"calculates":[83],"current":[85,102],"measure":[86,105],"device":[88,103,138],"based":[90,142],"activities":[93],"behavior.":[95],"are":[98],"authorized":[99],"if":[100],"meets":[106],"minimum":[108],"requirement":[109],"application.":[112],"uses":[115],"combination":[117],"authentication":[119],"methods":[120],"password,":[123],"pin,":[124],"pattern,":[125],"finger":[126],"print,":[127],"voice":[128,151],"face":[130,149],"recognition.":[131],"addition,":[133],"adjusting":[136],"level":[140],"dynamically":[141],"activities,":[145],"behavior,":[146],"background":[148],"authentication.":[152],"As":[153],"study,":[156],"has":[159],"been":[160],"implemented":[161],"Google":[164],"Android":[165],"platform.":[166],"minimizes":[171],"intrusively":[175],"authenticate":[176],"for":[179],"every":[180],"transaction":[182],"thus":[183],"maintaining":[184],"simplicity":[186],"using":[188],"while":[190],"enhancing":[191],"its":[192],"security.":[193]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2125806191","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2024-12-11T11:05:29.743210","created_date":"2016-06-24"}