{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:22:53Z","timestamp":1742383373474},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540720362"},{"type":"electronic","value":"9783540720379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72037-9_2","type":"book-chapter","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T14:15:26Z","timestamp":1182435326000},"page":"19-36","source":"Crossref","is-referenced-by-count":15,"title":["Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices"],"prefix":"10.1007","author":[{"given":"Eamonn","family":"O\u2019Neill","sequence":"first","affiliation":[]},{"given":"Peter","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Garzonis","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Warr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S.L. Garfinkel","year":"2005","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: an overview of problems and proposed solutions. IEEE Security & Privacy\u00a03(3), 34\u201343 (2005)","journal-title":"IEEE Security & Privacy"},{"issue":"9","key":"2_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1081992.1082023","volume":"48","author":"O. G\u00fcnther","year":"2005","unstructured":"G\u00fcnther, O., Spiekermann, S.: RFID and the perception of control: the consumer\u2019s view. Commun. ACM\u00a048(9), 73\u201376 (2005)","journal-title":"Commun. ACM"},{"key":"2_CR3","volume-title":"Secure foundations: key issues in crime prevention, crime reduction and community safety","author":"B. Hillier","year":"2000","unstructured":"Hillier, B., Shu, S.: Crime and urban layout: the need for evidence. In: Ballityne, S., Pease, K., McLaren, V. (eds.) Secure foundations: key issues in crime prevention, crime reduction and community safety, IPPR, London (2000)"},{"key":"2_CR4","unstructured":"Kindberg, T., O\u2019Hara, K.: \u201cYou are here\u201d \u2013 experiences with located systems. HP Labs Technical Report HPL-2006-120 (2006), \n                    \n                      http:\/\/www.hpl.hp.com\/techreports\/2006\/HPL-2006-120.pdf"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/11752967_15","volume-title":"Location- and Context-Awareness","author":"V. Kostakos","year":"2006","unstructured":"Kostakos, V., O\u2019Neill, E., Shahi, A.: Building common ground for face to face interactions by sharing mobile device context. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol.\u00a03987, pp. 222\u2013238. Springer, Heidelberg (2006)"},{"issue":"9","key":"2_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1081992.1082022","volume":"48","author":"M. Ohkubo","year":"2005","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID privacy issues and technical challenges. Commun. ACM\u00a048(9), 66\u201371 (2005)","journal-title":"Commun. ACM"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/11853565_8","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"S.N. Patel","year":"2006","unstructured":"Patel, S.N., et al.: Farther than you think: an empirical investigation of the proximity of users to their mobile phones. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol.\u00a04206, pp. 123\u2013140. Springer, Heidelberg (2006)"},{"issue":"9","key":"2_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1081992.1082020","volume":"48","author":"T. Pering","year":"2005","unstructured":"Pering, T., Ballagas, R., Want, R.: Spontaneous marriages of mobile devices and interactive spaces. Commun. ACM\u00a048(9), 53\u201359 (2005)","journal-title":"Commun. ACM"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MPRV.2006.12","volume":"5","author":"J. Riekki","year":"2006","unstructured":"Riekki, J., Salminen, T., Alakarppa, I.: Requesting pervasive services by touching RFID tags. IEEE Pervasive Computing\u00a05(1), 40\u201346 (2006)","journal-title":"IEEE Pervasive Computing"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/11853565_6","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"E. Rukzio","year":"2006","unstructured":"Rukzio, E., et al.: An experimental comparison of physical mobile interaction techniques: touching, pointing and scanning. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol.\u00a04206, pp. 87\u2013104. Springer, Heidelberg (2006)"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1055959.1055965","volume":"9","author":"D. Scott","year":"2005","unstructured":"Scott, D., et al.: Using visual tags to bypass Bluetooth device discovery. SIGMOBILE Mob. Comput. Commun. Rev.\u00a09(1), 41\u201353 (2005)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MPRV.2005.44","volume":"4","author":"E. Toye","year":"2005","unstructured":"Toye, E., et al.: Using smart phones to access site-specific services. IEEE Pervasive Computing\u00a04(2), 60\u201366 (2005)","journal-title":"IEEE Pervasive Computing"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Want, R.: An introduction to RFID technology. IEEE Pervasive Computing, 25-33 (Jan.-Mar. 2006)","DOI":"10.1109\/MPRV.2006.2"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72037-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:28:42Z","timestamp":1605763722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72037-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720362","9783540720379"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72037-9_2","relation":{},"subject":[]}}