Micro-interactions with NFC-Enabled Mobile Phones
暂无分享,去创建一个
[1] Ors Yalcin,et al. Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers , 2010, RFIDSec.
[2] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[3] Richard A. Bolt,et al. “Put-that-there”: Voice and gesture at the graphics interface , 1980, SIGGRAPH '80.
[4] Vibhor Sharma,et al. Near Field Communication , 2013, Encyclopedia of Biometrics.
[5] Jakob E. Bardram,et al. Activity-based computing: support for mobility and collaboration in ubiquitous computing , 2005, Personal and Ubiquitous Computing.
[6] Rafael Ballagas,et al. Spontaneous marriages of mobile devices and interactive spaces , 2005, CACM.
[7] Frank Vahid,et al. Enabling nonexpert construction of basic sensor-based systems , 2009, TCHI.
[8] Mark W. Newman,et al. Experiences with recombinant computing: Exploring ad hoc interoperability in evolving digital networks , 2009, TCHI.
[9] Roy Want,et al. Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.
[10] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[11] Nitesh Saxena,et al. Universal device pairing using an auxiliary device , 2008, SOUPS '08.
[12] Antti Oulasvirta,et al. Mobile kits and laptop trays: managing multiple devices in mobile information work , 2007, CHI.
[13] Dan R. Olsen,et al. Join and capture: a model for nomadic interaction , 2001, UIST '01.
[14] Andrew D. Wilson,et al. BlueTable: connecting wireless mobile devices on interactive surfaces using vision-based handshaking , 2007, GI '07.
[15] Eamonn O'Neill,et al. Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices , 2007, Pervasive.
[16] Bill N. Schilit,et al. Looking across four system layers — link , network , data , and application — the authors survey the technologies , standards , and leading-edge research making device ensembles a reality , 2022 .
[17] Gerhard P. Hancke,et al. Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.
[18] R. W. Peterson,et al. OPTICAL INTERFEROMETRY OF SURFACES , 1991 .
[19] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.
[20] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[21] John C. Tang,et al. Recent shortcuts: using recent interactions to support shared activities , 2007, CHI.
[22] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[23] A BoltRichard,et al. Put-that-there , 1980 .
[24] David Dearman,et al. It's on my other computer!: computing with multiple devices , 2008, CHI.
[25] Barbara Rosario,et al. Enabling Pervasive Collaboration with Platform Composition , 2009, Pervasive.
[26] Dominik Schmidt. PhoneTouch: a technique for direct phone interaction on surfaces , 2010, ITS '10.
[27] Jeffrey Nichols,et al. An infrastructure for extending applications' user experiences across multiple personal devices , 2008, UIST '08.