Academic literature on the topic 'NFC-tags'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NFC-tags.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "NFC-tags"

1

Pyykkönen, Mikko, Jukka Riekki, Ismo Alakärppä, Ivan Sanchez, Marta Cortes, and Sonja Saukkonen. "Designing Tangible User Interfaces for NFC Phones." Advances in Human-Computer Interaction 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/575463.

Full text
Abstract:
The increasing amount of NFC phones is attracting application developers to utilize NFC functionality. We can hence soon expect a large amount of mobile applications that users command by touching NFC tags in their environment with their NFC phones. The communication technology and the data formats have been standardized by the NFC Forum, but there are no conventions for advertising to the users NFC tags and the functionality touching the tags triggers. Only individual graphical symbols have been suggested when guidelines for advertising a rich variety of functionality are called for. In this paper, we identify the main challenges and present our proposal, a set of design guidelines based on more than twenty application prototypes we have built. We hope to initiate discussion and research resulting in uniform user interfaces for NFC-based services.
APA, Harvard, Vancouver, ISO, and other styles
2

Myny, Kris, Ashutosh K. Tripathi, Jan-Laurens van der Steen, and Brian Cobb. "Flexible thin-film NFC tags." IEEE Communications Magazine 53, no. 10 (2015): 182–89. http://dx.doi.org/10.1109/mcom.2015.7295482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Azhari, Firman. "Quick detection of NFC vulnerability." Information Management & Computer Security 22, no. 2 (2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.

Full text
Abstract:
Purpose – The purpose of this research is to explain particular implementation weaknesses of near field communication (NFC) systems done by several institutions which apply for critical purposes and provide practical solutions. Design/methodology/approach – This research is done by literature studies of previous findings in NFC security, observations of some existing implemented systems and experimentations to provide practical solutions. Findings – Unintentional lack of security protection of the NFC cards and tags by some card issuers make them a vulnerable target. The outcomes of this research are proposed solutions on methods to quickly detect vulnerability in NFC tags using an Android-based mobile application. Another solution involves the assembly of a detection device using the portable, low power and powerful Raspberry Pi to analyze the NFC tags or cards and NFC reader vulnerabilities. Research limitations/implications – This research is conducted in Indonesia; therefore, the results and solutions may lack generalizability. However, the findings may occur in other countries which newly apply NFC technology. Practical implications – System implementer should become more aware about the security issue of old NFC tags like MIFARE Classic. Price should be considered after tag security. People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology. Social implications – People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology. Originality/value – This research fulfills an identified need to evaluate the security aspect of a system that uses NFC as one of the main technologies. The results and solutions also provides cheap, easy and practical tools to analyze NFC security.
APA, Harvard, Vancouver, ISO, and other styles
4

Prodanoff, Zornitza Genova, Edward L. Jones, Hongmei Chi, Sherif Elfayoumy, and Cynthia Cummings. "Survey of Security Challenges in NFC and RFID for E-Health Applications." International Journal of E-Health and Medical Communications 7, no. 2 (2016): 1–13. http://dx.doi.org/10.4018/ijehmc.2016040101.

Full text
Abstract:
Hospitals worldwide have implemented High Frequency (HF) Radio Frequency Identification (RFID) networks for supplies tracking in ER setting, in-patient identification, surgical instrument management, and other applications. Merging of Web, Near Filed Communication (NFC), and HF RFID technologies for their combined use in e-Health applications is a logical next step due to the wide availability of NFC-enabled smartphones. This article outlines some resulting security challenges. Tags are often compliant with multiple standards that operate in the same frequency range. For example, HF RFID tags have already been adopted for in-patient tracking, yet smartphone NFC reader apps can freely access data on those tags. While tag– or session–centered security protocols exist for some RFID standards (e.g. ISO/IEC 29167), no ISO security standard is currently available for HF RFID tags. In such systems, proper traffic characterization can lead to better understanding of operation under “normal” system state conditions and could potentially help to identify security breaches.
APA, Harvard, Vancouver, ISO, and other styles
5

Fadhil, Rahmad, and Mohammad Hafiz Hersyah. "Rancang Bangun Sistem Reservasi Ruangan Menggunakan Near Field Communication (NFC) Berbasis Mikrokontroller." JITCE (Journal of Information Technology and Computer Engineering) 4, no. 02 (2020): 95–104. http://dx.doi.org/10.25077/jitce.4.02.95-104.2020.

Full text
Abstract:
Current technological developments also help in the ordering system. Simplifying the reservation system with information technology is one of the innovations made to help users of the room more easily in booking a room. The system designed consists of hardware and software connected to book a room based on, UID, usage time and to open the door of the room. Hardware includes Arduino Mega, NFC tags, NFC readers, relays, solenoids, buzzers, and LEDs. The software includes a Mysql website and database. The system will store user data, date, shift, length of usage and type of room booked by the user. NFC tags will be used by the customer to open the door to the room by getting closer to the NFC reader. This system aims to facilitate the process of borrowing space without having to undergo a convoluted process.
APA, Harvard, Vancouver, ISO, and other styles
6

Echevarria, Juan Jose, Jonathan Ruiz-de-Garibay, Jon Legarda, Maite Álvarez, Ana Ayerbe, and Juan Ignacio Vazquez. "WebTag: Web Browsing into Sensor Tags over NFC." Sensors 12, no. 7 (2012): 8675–90. http://dx.doi.org/10.3390/s120708675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quratulain, Masud, and Fatima Munazza. "NFC Tags Based Notification System for Medical Appointments." International Journal of Automation and Smart Technology 4, no. 4 (2014): 191–95. http://dx.doi.org/10.5875/ausmt.v4i4.742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lazaro, Antonio, Ramon Villarino, and David Girbau. "A Survey of NFC Sensors Based on Energy Harvesting for IoT Applications." Sensors 18, no. 11 (2018): 3746. http://dx.doi.org/10.3390/s18113746.

Full text
Abstract:
In this article, an overview of recent advances in the field of battery-less near-field communication (NFC) sensors is provided, along with a brief comparison of other short-range radio-frequency identification (RFID) technologies. After reviewing power transfer using NFC, recommendations are made for the practical design of NFC-based tags and NFC readers. A list of commercial NFC integrated circuits with energy-harvesting capabilities is also provided. Finally, a survey of the state of the art in NFC-based sensors is presented, which demonstrates that a wide range of sensors (both chemical and physical) can be used with this technology. Particular interest arose in wearable sensors and cold-chain traceability applications. The availability of low-cost devices and the incorporation of NFC readers into most current mobile phones make NFC technology key to the development of green Internet of Things (IoT) applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Viegas, Vítor, Octavian Postolache, and J. M. Dias Pereira. "Transducer Electronic Data Sheets: Anywhere, Anytime, Anyway." Electronics 8, no. 11 (2019): 1345. http://dx.doi.org/10.3390/electronics8111345.

Full text
Abstract:
Transducer electronic data sheets (TEDS) are a key element of smart transducers because they support core features such as plug and play, self-calibration, and self-diagnostics. The ISO/IEC/IEEE 21451-4 standard defines templates to describe the most common types of transducers and suggests the use of one-wire memories to store the corresponding data. In this paper we explore new ways to store and access TEDS tables, including near field communication (NFC) tags and QR codes. We also present a mobile TEDS parser, compatible with Android, that is capable of reading TEDS data from all supported mediums (one-wire memories, NFC tags, and QR codes) and decoding them as human-readable text. The idea is to make TEDS available in the easiest way possible. We also underline the need to extend the 21451-4 standard by adding support for frequency–time sensors. A new TEDS template is proposed, and filling examples are presented. The main novelties of the paper are (i) the proposal of new ways to store 21451-4 TEDS tables using NFC tags and QR codes; (ii) the release of new tools to access TEDS tables including a mobile parser; and (iii) the definition of a new TEDS template for frequency–time sensors.
APA, Harvard, Vancouver, ISO, and other styles
10

Kranz, Matthias, Lukas Murmann, and Florian Michahelles. "Research in the Large." International Journal of Mobile Human Computer Interaction 5, no. 1 (2013): 45–61. http://dx.doi.org/10.4018/jmhci.2013010103.

Full text
Abstract:
The adoption of NFC technology has taken longer than expected after its inception in 2004. Several projects on ticketing and payment are gaining momentum. However, the actual state of adoption of NFC is still unclear. As an alternative to consultants’ prediction (which mostly prove wrong), this paper describes a gamification-based approach to motivate users themselves to report on NFC tags they spotted in their environment. As part of a trading card context, users get rewarded with gadgets and points for documenting the existence of NFC technology in their environment. This paper describes the development of this game and the experiences of two release cycles. The paper concludes with lessons learned and provides an outlook on next steps.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "NFC-tags"

1

HASSAN, FARRUKH. "ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.

Full text
Abstract:
This thesis communicates a new approach for the future Library system using secure NFC technology. Today we can use NFC and Android based mobile phones to build modern library system in which user will instead of standing in the queue can directly borrow and return books. The NFC technology which will use in this thesis is capable of storing small amount of information. This storage will be used for maintaining the books records. Although the NFC works in close proximity but still there are possibilities of attacks. Due to contact less communication the victim cannot notice the attacks. There are different types of attacks which can occur including modification of data and listening to the communication by unknown user. Therefore in this thesis the author will look into how one can protect the system from these kinds of at-tacks. The motivation behind the thesis is to introduce scalable cloud based infrastructure as a backbone Library. Current systems using bar code technology are not secure. Therefore an infrastructure needs to be built which includes cloud based server for key distribution and data storage. Furthermore, this thesis includes a study of the encryption and decryption schemes for close proximity communications. A new novel algorithm has been introduced and implemented as an encryption scheme for this thesis work. The Huffman scheme has been modified and 16 bit keys have been used for the key exchange. The new approach is compared with the existing techniques and found that it is reliable as compared to other techniques.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamberg, Lisa, and Christine Huber. "Near Field Communication : En studie om NFC-teknikens möjliga användningsområden och utveckling inom sociala medier." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-26165.

Full text
Abstract:
In this report we examine the NFC (Near Field Communication) technology as far as the development has come until today. We adress different use areas and explain the technical funcionality. By using data collection methods as a specialist interview and also a survery we want to detect potential risks and safety-issues in implementation of the new technology. Our main-focus in this report is to examine how NFC can play an important role in the developement of social interaction and social media. By compiling our data and research materials we will analyze and present a report conslusion. In our conclusion we will introduce our thoughts about the technology as NFC gets more and more common in our physical lives and also propose further research-areas. We will share potential risks about the technology as it is developing to alert future researchers and developers, but also pay attention to the opportunities the technology may bring.<br>Med vår studie har vi valt att undersöka tekniken NFC (eng. Near Field Communication) så långt som utvecklingen har kommit i dagsläget. Vi redogör kring vad det finns för olika användningsområden och hur NFC fungerar ur ett tekniskt perspektiv. Genom att intervjua en person som arbetar nära tekniken samt utföra en enkätundersökning vill vi upptäcka potentiella säkerhetsrisker som medföljer implementeringen av tekniken. Studiens huvudfokus är att undersöka hur och om NFC kan ha en viktig roll i utvecklingen och framtiden för sociala medier och interaktion. Med den data vi samlar in under studiens gång kommer vi analysera, diskutera och komma fram till en slutsats. Vi kommer att delge våra tankar kring teknologin då den blir mer och mer vanlig i våra fysiska liv och föreslå vidare forskningsområden. Vi vill uppmärksamma framtida forskare och utvecklare av NFC om potentiella risker som tekniken medför, men också de möjligheter som tekniken öppnar upp.
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Michelle. "Labeling Is Out Of Fashion: NFC Technology Towards Sustainability In Fashion Retail." Kent State University Honors College / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1525695778821744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Li-Jen, and 張力仁. "A Locker System With NFC Tags." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56kx7r.

Full text
Abstract:
碩士<br>聖約翰科技大學<br>資訊與通訊系碩士班<br>104<br>In the past, most of the lockers installed in public facilities were traditional mechanical lockers that use either the password or the key as an access means. On the other hand, electronic lockers were relatively rare because of high manufacture cost and appropriate technologies being unavailable then. However, mechanical lockers are easy to be broken in, such that the stuff put in the locker is not safe from stealing. Moreover, key lost or password forgotten happens all the time, causing personal belongings placed in the locker unable to be retrieved immediately because further confirmation of the renter’s identity is necessary.Because the Internet network continues to grow at a rapid pace, many strategic technologies have evolved on the Internet platform, such as Internet of Things (IoT), Cloud Computing, and Big Data. IoT is the network of objects incorporated with electronics, sensors, and software, which allows objects to be sensed and controlled remotely as well as useful information to be collected and exchanged across existing Internet infrastructure. Therefore, many advanced applications associated with intelligent identification, locating, tracking, monitoring, and managing can be developed with IoT. Recently, due to the development and application of radio frequency identification technology increasing rapidly, the near field communication (NFC) reader is embedded in most new cell phones, making these devices more suitable for IoT applications.This study employs IoT, NFC, and QR Code technologies, as well as devices of Android cell phone, Arduino microcontroller, and Raspberry Pi microcomputer to develop a locker system with NFC tags. By introducing the IoT paradigm, this system is enhanced with efficiency, convenience, and security, thus overcoming the drawbacks of traditional lockers. In the system, two kinds of tags are provided, where one is the primary NFC tags and the other the backup QR Code tags. After a user downloads and installs the APP written by the author to his cell phone, he can rent a locker by reading the NFC tag attached to that locker with his phone, and experience the use of a more efficient, convenient, and secure locker system.
APA, Harvard, Vancouver, ISO, and other styles
5

CHAN, CHIH-YU, and 詹智宇. "Encrypted NFC Tags for Preventing Unauthorized Access." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/42881402291982139659.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>101<br>NFC (Near Field Communication) refers to a standards-based connectivity technology, is an extension of existing RFID (Radio Frequency Identification) standards. NFC technology provides wireless connectivity in close proximity, enabling communication and data transfer between electronic devices. Given the inherent security of transmission over short distances and its fairly intuitive operation, NFC technology is extensively used in access control, ticketing, electronic payment and device pairing. With increasing use of NFC applications, security issues have become more serious. In particular, the “Passive Tag” has no CPU to establish a secure channel by performing encryption. Currently, no significant mechanisms for protecting sensitive data stored in tags. This study, a security mechanism is proposed for preventing unauthorized access. Encryption and decryption functions are implemented on an Android smartphone application to store encrypted data in NFC tags. Malicious attackers see only unreadable and unrecognizable “Cipher text” from NFC tags when gain unauthorized access. Therefore, the proposed security mechanism can be used to secure personal data in NFC tags. Measurements made using a currently available Android smart phone reveal that, 700bytes of data can be encrypted/decrypted by AES Encryption in less than 20ms, and that 32bytes of data can be encrypted/decrypted by RSA encryption/decryption in less than 140ms. The data can be compressed using Huffman coding before they are stored in NFC Tags. 700bytes of uncompressed data can be compressed to 400bytes. The time for Tag access is also reduced.
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Szu Yu, and 林思妤. "The NFC Tags Verification Scheme for Product Legality." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/33p9es.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

FU, CHI-NING, and 傅琦甯. "Using NFC Tags and Smartphones to Design a Reliable Mechanism to Pick a Child up from School." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/e48xfu.

Full text
Abstract:
碩士<br>輔仁大學<br>電機工程學系碩士班<br>106<br>The time after school has been dismissed for the day is the most chaotic situation for school personnel. This design proposes a simple system which provides a reliable management mechanism that can be used when a child needs to be picked up from a school and when pick up personnel need to confirm a pick up. This design is used to reduce losing children during the pick-up process from the school. This design uses the NFC tag function in a smartphone to provide the pick-up process. This design uses a pick up child management system to identify the pick-up person and to notify the verification to the child’s parent. This design includes the several functions. The first function is to facilitate the management of children and the child's pick-up person and automatically scan the pick-up person NFC’s tag when they arrive and leave the school. The second function is a provision for the school personnel to remind the pick-up person who has not arrived at the school, and to remind the parents to confirm the pick-up process. The third function provides the NFC function sense the pick-up person’s NFC tag from a short distance. The fourth function uses the NFC tag’s unique serial numbers to build a table for the whole student class. These functions shorten the comparison between the kid’s NFC tag and the pick-up person’s NFC tag. Overall, this design uses common and low cost equipment with an easily operated maintenance system. The NFC tag which is carried by the child can provide a basic message that can be sent in an emergency within a short time either to the contact parents or the contact person.
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Yun-Chong, and 吳雲中. "A STUDY OF DISTANCE BLESSING PATTERN : EXEMPLIFIED BY SMALL GADGETS EMBEDDED NFC TAGS COLLOCATE WITH GREETING CARD DESIGN." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/11201426680092388367.

Full text
Abstract:
碩士<br>大同大學<br>工業設計學系(所)<br>103<br>Auspicious blessing words can be said as world&apos;s common language, in human culture the oldest and most traditional way for distance blessing are the paper greeting cards. However, the rise of digital technology, mobile messaging, network communication of digital media technology due to its advantages of convenience, gradually replacing the paper greeting cards in long-distance blessings function. Change patterns of human distance blessing of the greatest and most direct, to be regarded as the popularity of mobile phones which have become important tools for modern life. Near field communication technology adapted on the smartphones and associated portable applications, has been gradually expand a new generation of phones into daily applications. In this study, we reference to the psychological factors of sending greeting cards, near field communication (NFC) technology and other related literatures to explore the application by NFC so that the NFC technology can collocate with the paper greeting cards, and through NFC smartphones, people those who receive a paper greeting cards could have more levels of positive psychological reactions. In addition, through the questionnaire survey and analysis about the distance blessing behaviors and product innovation via the scenario design to create a set of products, Finally, through the scenario simulation processes to the user experience of the innovative design for the target group, through the questionnaire survey and analysis to obtain the psychological impact of different level of reactions. The innovative design of this study can also be the reference for future in-depth development of distance blessing design.
APA, Harvard, Vancouver, ISO, and other styles
9

PENIAŠTEKOVÁ, Gabriela. "Využití technologických inovací u vybraného podniku maloobchodu." Master's thesis, 2012. http://www.nusl.cz/ntk/nusl-136650.

Full text
Abstract:
Presented diploma work represents a further development of my bachelor-degree diploma work, dealing with new technologies in retail business. In contrast of said bachelor diploma work, which extent was limited to theoretical part of the problem, practical application of the objective new technologies has been analyzed within TESCO stores buiseness environment. Therefore, this diploma work deals with specific technologies, which are really used in the TESCO retail network. The technologies analyzed in this work were chosen on the basis of Retail Summit 2011 topics. Application potential of m-commerce and e-commerce is analyzed and EDI technology innovation, which makes this option available for small companies, is described. Beside self-service cash desks, which are currently widely used, the RFID, NFC and LCD price tags, which are still in the testing process, are dealt with.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "NFC-tags"

1

Holleis, Paul, Maximilian Scherr, and Gregor Broll. "A Revised Mobile KLM for Interaction with Multiple NFC-Tags." In Human-Computer Interaction – INTERACT 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23768-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gatis Filho, Sílvio José Vieira, Jefté de Assumpção Macedo, Marília Moraes Saraiva, Jean Elder Araújo Souza, Felipe Borba Breyer, and Judith Kelner. "My Best Shirt with the Right Pants: Improving the Outfits of Visually Impaired People with QR Codes and NFC Tags." In Design, User Experience, and Usability: Designing Interactions. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91803-7_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paret, Dominique. "Antennas for Targets and Tags: Detailed Calculations." In Antenna Designs for NFC Devices. John Wiley & Sons, Inc., 2016. http://dx.doi.org/10.1002/9781119145301.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jayapandian N. "Business Transaction Privacy and Security Issues in Near Field Communication." In Network Security and Its Impact on Business Strategy. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8455-1.ch005.

Full text
Abstract:
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
5

Jayapandian N. "Business Transaction Privacy and Security Issues in Near Field Communication." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch038.

Full text
Abstract:
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
6

Jayapandian N. "Business Transaction Privacy and Security Issues in Near Field Communication." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch038.

Full text
Abstract:
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.
APA, Harvard, Vancouver, ISO, and other styles
7

Hui Eow, Amy Sze, Jiayu Guo, and Sheng-Uei Guan. "Tourist Applications Made Easier Using Near Field Communication." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch189.

Full text
Abstract:
Near field communication (NFC) is a new wireless connectivity technology that enables short-range communication between electronic devices. The operation of NFC is intuitive, making it easy for consumers to use. With built-in security, it has great potential for payment and financial applications. However, NFC is a relatively new technology and the related industries are still brainstorming for extensive applications to make it more marketable. Hence, the aim of our research is to design and build a working prototype for tourists using NFC and smart card. Undoubtedly, photo-taking is an integral part of every tourist’s holiday. However, it is noticed that pictures alone are often incomplete. People hardly remember the details of the places they have visited and find it a hassle to keep records of the attractions. Hence, it is more meaningful if digital photos have short descriptions attached with little effort. Another observation is that although it is often cheaper for tourists to purchase tour packages, it is a hassle to keep track of several tickets. Such inconvenience can be reduced with a single device that is able to store tickets electronically. With the above observation in mind, we propose an NFC system (HolidayPaL) that would benefit tourists so that they have more memorable holidays. Firstly, NFC tags will be placed at each attraction, storing relevant snippets of site descriptions. The tourists can then use their NFC-enabled cameras to input the descriptions, which will then be attached to relevant photos. Personal comments can be added later as well. Tourists can subsequently view the photos and captions using some photo-album software. These captions give tourists better understanding and more vivid memory of the heritage and culture of the places visited. Another feature of the proposed application is to use NFC devices to store electronic tickets. Tourists can purchase a package over the counter and transfer it to their handheld devices via NFC. Subsequently, they can just tap their NFC devices at the entrance of each attraction to gain admission. The proposed NFC application will benefit three groups of people: individual tourists, the tourism industry, and digital camera manufacturers.
APA, Harvard, Vancouver, ISO, and other styles
8

P, Sheela Rani, Sankara Revathi S, Dharshini J S, and Rekha M. "Identification of Product Originality Based on Supply Chain Management Using Block Chain." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200141.

Full text
Abstract:
The Internet of Things (IOT) is integrated with supply chain management process to track the product. To track the product smart tags is used. The smart tags like QR code and NFC is used. But with the technology enhancement the block chain is introduced into the supply chain management process. The block chain is the great revolution that data in the centralized form is transformed in to a decentralized manner. The distributed Ledger Technology (DLT) is one of the method used in ethereum block chain. The main advantage of using DLT is, it offers decentralized, privacy-preserving and verifiable process in the smart tags. In existing system only single server was used to maintain all the process like supplier, manufacturer and distributor. In this application we are using different server which was more secure than existing system. The proposed solution in this paper is it checks the product evidence during the entire lifecycle of the product by using the smart contract. The data can be immutable by using smart contract with ethereum block chain. The duplication is manipulated by the block chainserver.
APA, Harvard, Vancouver, ISO, and other styles
9

Isomursu, Minna, and Mari Ervasti. "Touch-Based Access to Mobile Internet." In Human-Computer Interaction and Innovation in Handheld, Mobile and Wearable Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-499-8.ch014.

Full text
Abstract:
This chapter reports user experience findings from two field trials, where Mobile Internet access was supported through Near Field Communication (NFC)-based tag infrastructure, The first field trial was done in public urban environment with the infrastructure of 2650 tags and 248 users, and the other field trial dealt with mobile learning with the infrastructure of 11 tags and 220 users. The authors results show that touch-based interaction can provide enhancement to the Mobile Internet user experience. Touch-based access builds a semantic bridge between the physical context of use and the Mobile Internet experience, the user experience converges seamlessly into one where both the physical and digital worlds play a role. The authors report and analyze the subjective experiences of the end users collected during the field trials. As a result, they summarize recommendations for interface and content design.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "NFC-tags"

1

Fei, Shenfeng, Andrew M. Webb, Andruid Kerne, Yin Qu, and Ajit Jain. "Peripheral array of tangible NFC tags." In ITS '13: The ACM International Conference on Interactive Tabletops and Surfaces. ACM, 2013. http://dx.doi.org/10.1145/2512349.2512820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Idowu, Samuel, Desta Haileselassie Hagos, Welderufael Berhane Tesfay, Abiola Famurewa, Juwel Rana, and Kare Synnes. "NexTrend: Context-Aware Music-Relay Corridors Using NFC Tags." In 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2013. http://dx.doi.org/10.1109/imis.2013.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jorda, Romeo L., Joshua Renz A. Coballes, Lejan Alfred C. Enriquez, et al. "Comparative Evaluation of NFC Tags for the NFC-Controlled Door Lock with Automated Circuit Breaker." In 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM). IEEE, 2018. http://dx.doi.org/10.1109/hnicem.2018.8666375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dunnebeil, Sebastian, Felix Kobler, Philip Koene, Jan Marco Leimeister, and Helmut Krcmar. "Encrypted NFC Emergency Tags Based on the German Telematics Infrastructure." In 2011 3rd International Workshop on Near Field Communication - NFC'11. IEEE, 2011. http://dx.doi.org/10.1109/nfc.2011.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pietro, Roberto Di, Gabriele Oligeri, Xavier Salleras, and Matteo Signorini. "N-Guard: a Solution to Secure Access to NFC tags." In 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018. http://dx.doi.org/10.1109/cns.2018.8433182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fei, Shenfeng, Andruid Kerne, Ajit Jain, Andrew M. Webb, and Yin Qu. "Positioning portals with peripheral NFC tags to embody trans-surface interaction." In ITS '13: The ACM International Conference on Interactive Tabletops and Surfaces. ACM, 2013. http://dx.doi.org/10.1145/2512349.2514593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Turki, B. M., and J. C. Batchelor. "Design Guidelines for printable Magnetic Shielding Films for NFC Tags on." In 12th European Conference on Antennas and Propagation (EuCAP 2018). Institution of Engineering and Technology, 2018. http://dx.doi.org/10.1049/cp.2018.0922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lazaro, Antonio, Marti Boada, Ramon Villarino, and David Girbau. "Feasibility Study on the Reading of Energy-Harvested Implanted NFC Tags Using Mobile Phones and Commercial NFC IC." In 2020 IEEE MTT-S International Microwave Biomedical Conference (IMBioC). IEEE, 2020. http://dx.doi.org/10.1109/imbioc47321.2020.9385033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bermejo, Carlos, Huber Flores, and Pan Hui. "Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags." In 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 2020. http://dx.doi.org/10.1109/percomworkshops48775.2020.9156089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Leoni, Alfiero, Federica Cucchiella, Luciano Mastrodicasa, and Vincenzo Stornelli. "A 3D Printable Apparatus for the Industrial Programming of NFC/RFID TAGs." In 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech). IEEE, 2019. http://dx.doi.org/10.23919/splitech.2019.8783165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography