Near-Field Communication Technology and Its Impact in Smart University and Digital Library: Comprehensive Study
暂无分享,去创建一个
[1] Irene Luque Ruiz,et al. Study of Near Field Communication Technology in University Scenarios , 2009 .
[2] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[3] Monica S. Lam,et al. Micro-interactions with NFC-Enabled Mobile Phones , 2011, MobiCASE.
[4] Pin-Han Ho,et al. Framework for NFC-Based Intelligent Agents: A Context-Awareness Enabler for Social Internet of Things , 2014, Int. J. Distributed Sens. Networks.
[5] Irene Luque Ruiz,et al. An NFC based context-aware solution for access to bibliographic sources in university environments , 2013, J. Ambient Intell. Smart Environ..
[6] Busra Ozdenizci,et al. A Survey on Near Field Communication (NFC) Technology , 2012, Wireless Personal Communications.
[7] Michelle Kelly Schultz,et al. A case study on the appropriateness of using quick response (QR) codes in libraries and museums , 2013 .
[8] Mabel Vazquez-Briseno,et al. Using RFID/NFC and QR-Code in Mobile Phones to Link the Physical and the Digital World , 2012 .
[9] Irene Luque Ruiz,et al. University Smart Poster: Study of NFC Technology Applications for University Ambient , 2009 .
[10] Jeffrey Fischer,et al. NFC in cell phones: The new paradigm for an interactive world [Near-Field Communications] , 2009, IEEE Communications Magazine.
[11] Josef Langer,et al. Digital Signature Records for the NFC Data Exchange Format , 2010, 2010 Second International Workshop on Near Field Communication.
[12] Yvonne Rogers,et al. Moving on from Weiser's Vision of Calm Computing: Engaging UbiComp Experiences , 2006, UbiComp.
[13] Eric H. Schnell. Near Field Communications: Features and Considerations , 2013 .
[14] T. W. C. Brown,et al. Evaluating the eavesdropping range of varying magnetic field strengths in NFC standards , 2013, 2013 7th European Conference on Antennas and Propagation (EuCAP).
[15] Mengyu Qiao,et al. Security of the near field communication protocol: an overview , 2013 .
[16] Friedemann Mattern,et al. The Vision and Technical Foundations of Ubiquitous Computing , 2001 .
[17] Pablo Pavon-Marino,et al. STUDY OF THE IMPACT OF NFC TECHNOLOGY ON THE UNIVERSITY SOCIETY , 2013 .
[18] J. Langer,et al. Applying relay attacks to Google Wallet , 2013, 2013 5th International Workshop on Near Field Communication (NFC).
[19] A. Ylisaukko-oja,et al. NFC-Enabled Wireless Charging , 2012, 2012 4th International Workshop on Near Field Communication.
[20] Sergio Ríos-Aguilar,et al. Control of attendance applied in higher education through mobile NFC technologies , 2013, Expert Syst. Appl..
[21] Chia-Chi Teng,et al. Personalized Shopping Experience with NFC Smartphone Apps and Electronic Shelf Label , 2013 .
[22] Harri Ketamo,et al. Combining the Dimensions of Written and Digital Media in a NFC-based Non-linear Adventure Game for Children , 2014 .
[23] Andrea Ciardulli,et al. Long Distance Relay Attack , 2013, RFIDSec.
[24] N. Tapus,et al. Easy attendance: location-based authentication for students integrated with moodle , 2013, 2013 11th RoEduNet International Conference.
[25] Haytham Elmiligi,et al. NFC security analysis and vulnerabilities in healthcare applications , 2013, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).
[26] Tuomo Tuikka,et al. Touch the Future with a Smart Touch , 2009 .
[27] Collin Mulliner,et al. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.
[28] Johann A. Briffa,et al. Eavesdropping near-field contactless payments: a quantitative analysis , 2013 .
[29] Kyung-Jae Bae,et al. The Ubiquitous Library for the Blind and Physically Handicapped — a case study of the LG Sangnam Library, Korea , 2007 .
[30] Forbes Gibb,et al. The application of RFIDs in libraries: an assessment of technological, management and professional issues , 2011, Int. J. Inf. Manag..
[31] Gerhard P. Hancke,et al. Practical eavesdropping and skimming attacks on high-frequency RFID tokens , 2011, J. Comput. Secur..
[32] Paul Dourish,et al. Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision , 2007, Personal and Ubiquitous Computing.
[33] Facultad de Ingeniería,et al. TOWARDS NFC AND RFID COMBINATION TO AUTOMATIC SERVICES , 2014 .
[34] JunWu Xu,et al. Research on 3G Application with NFC , 2012 .
[35] Busra Ozdenizci,et al. Near Field Communication : From Theory to Practice , 2012 .
[36] Karen Coyle,et al. Management of RFID in libraries , 2005 .
[37] Andrew Walsh,et al. Blurring the boundaries between our physical and electronic libraries: Location-aware technologies, QR codes and RFID tags , 2011, Electron. Libr..
[38] Kevin Curran,et al. Near Field Communication , 2012 .
[39] Wayan Suparta. Application of near field communication technology for mobile airline ticketing , 2012 .
[40] Jaime Lloret,et al. A secure NFC application for credit transfer among mobile phones , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[41] V. M. Wadhai,et al. NFC: A review of technology, tags, applications and security , 2013 .
[42] Carlo Maria Medaglia,et al. NFC Ticketing: A Prototype and Usability Test of an NFC-Based Virtual Ticketing Application , 2009, 2009 First International Workshop on Near Field Communication.
[43] James F. Hahn,et al. Adventure code camp: : library mobile design in the backcountry , 2014 .
[44] M. Victoria Bueno-Delgado,et al. The Smart University Experience: An NFC-Based Ubiquitous Environment , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[45] Ping Chen,et al. Research of NFC Technology on Smartphones , 2012 .
[46] Ernst Haselsteiner. Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .
[47] Hauptadministrator,et al. QR code , 2016, The Fairchild Books Dictionary of Fashion.
[48] Michael Friedewald,et al. Ubiquitous computing: An overview of technology impacts , 2011, Telematics Informatics.
[49] Puchong Subpratatsavee,et al. Notice of Violation of IEEE Publication PrinciplesAttendance System Using NFC Technology and Embedded Camera Device on Mobile Phone , 2014, 2014 International Conference on Information Science & Applications (ICISA).
[50] Sheli McHugh,et al. Near Field Communication: Introduction and Implications , 2012 .
[51] Balázs Benyó,et al. Student attendance monitoring at the university using NFC , 2012, Wireless Telecommunications Symposium 2012.
[52] Naveed Ashraf Chattha. NFC — Vulnerabilities and defense , 2014, 2014 Conference on Information Assurance and Cyber Security (CIACS).
[53] Gerhard P. Hancke,et al. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones , 2011, IACR Cryptol. ePrint Arch..
[54] V. Volpi,et al. NFC technology applied to touristic-cultural field: A case study on an Italian museum , 2013, 2013 5th International Workshop on Near Field Communication (NFC).
[55] Embong Abdullah,et al. Database Integration via Mediator Approach for Integrated Applications with NFC Technology , 2013 .
[56] Sheli McHugh,et al. Near Field Communication: Recent Developments and Library Implications , 2014, Near Field Communication: Recent Developments and Library Implications.