{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:25:18Z","timestamp":1725557118695},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642323195"},{"type":"electronic","value":"9783642323201"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32320-1_9","type":"book-chapter","created":{"date-parts":[[2012,7,16]],"date-time":"2012-07-16T12:15:49Z","timestamp":1342440949000},"page":"118-136","source":"Crossref","is-referenced-by-count":9,"title":["Micro-interactions with NFC-Enabled Mobile Phones"],"prefix":"10.1007","author":[{"given":"Ben","family":"Dodson","sequence":"first","affiliation":[]},{"given":"Monica S.","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/s00779-004-0335-2","volume":"9","author":"E. Bardram","year":"2005","unstructured":"Bardram, E.: Activity-based computing: support for mobility and collaboration in ubiquitous computing. Personal Ubiquitous Comput.\u00a09, 312\u2013322 (2005)","journal-title":"Personal Ubiquitous Comput."},{"key":"9_CR2","first-page":"262","volume-title":"Proceedings of the 7th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1980","author":"A. Richard","year":"1980","unstructured":"Richard, A.: Bolt. \u201cput-that-there:\u201d voice and gesture at the graphics interface. In: Proceedings of the 7th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1980, pp. 262\u2013270. ACM, New York (1980)"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1145\/1357054.1357177","volume-title":"Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, CHI 2008","author":"D. Dearman","year":"2008","unstructured":"Dearman, D., Pierce, J.S.: It\u2019s on my other computer!: computing with multiple devices. In: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, CHI 2008, pp. 767\u2013776. ACM, New York (2008)"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1502800.1502803","volume":"16","author":"W. Keith Edwards","year":"2009","unstructured":"Keith Edwards, W., Newman, M.W., Sedivy, J.Z., Smith, T.F.: Experiences with recombinant computing: Exploring ad hoc interoperability in evolving digital networks. ACM Trans. Comput.-Hum. Interact.\u00a016(1), 1\u201344 (2009)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"9_CR5","unstructured":"NFC Forum. Nfc forum technical specifications (2010), http:\/\/www.nfc-forum.org\/specs\/spec_list"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-16822-2_4","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"L. Francis","year":"2010","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 35\u201349. Springer, Heidelberg (2010)"},{"key":"9_CR7","unstructured":"Google. Near field communication (2011), http:\/\/developer.android.com\/guide\/topics\/nfc\/index.html#p2p"},{"key":"9_CR8","unstructured":"Junction, http:\/\/openjunction.org"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TMC.2009.51","volume":"8","author":"R. Mayrhofer","year":"2009","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing\u00a08, 792\u2013806 (2009)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Olsen, D.R., Travis Nielsen, S., Parslow, D.: Join and capture: A model for nomadic interaction. In: Proceedings of 14th Annual ACM Symposium on User Interface Software and Technology, pp. 131\u2013140. Press (2001)","DOI":"10.1145\/502348.502367"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-72037-9_2","volume-title":"Pervasive Computing","author":"E. O\u2019Neill","year":"2007","unstructured":"O\u2019Neill, E., Thompson, P., Garzonis, S., Warr, A.: Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 19\u201336. Springer, Heidelberg (2007)"},{"key":"9_CR12","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1145\/1240624.1240795","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007","author":"A. Oulasvirta","year":"2007","unstructured":"Oulasvirta, A., Sumari, L.: Mobile kits and laptop trays: managing multiple devices in mobile information work. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 1127\u20131136. ACM, New York (2007)"},{"issue":"9","key":"9_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1081992.1082020","volume":"48","author":"T. Pering","year":"2005","unstructured":"Pering, T., Ballagas, R., Want, R.: Spontaneous marriages of mobile devices and interactive spaces. Commun. ACM\u00a048(9), 53\u201359 (2005)","journal-title":"Commun. ACM"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-01516-8_14","volume-title":"Pervasive Computing","author":"T. Pering","year":"2009","unstructured":"Pering, T., Want, R., Rosario, B., Sud, S., Lyons, K.: Enabling Pervasive Collaboration with Platform Composition. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol.\u00a05538, pp. 184\u2013201. Springer, Heidelberg (2009)"},{"key":"9_CR15","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1449715.1449733","volume-title":"Proceedings of the 21st Annual ACM Symposium on User Interface Software and Technology, UIST 2008","author":"J.S. Pierce","year":"2008","unstructured":"Pierce, J.S., Nichols, J.: An infrastructure for extending applications\u2019 user experiences across multiple personal devices. In: Proceedings of the 21st Annual ACM Symposium on User Interface Software and Technology, UIST 2008, pp. 101\u2013110. ACM, New York (2008)"},{"key":"9_CR16","unstructured":"Juniper Research. 1 in 5 Smartphones will have NFC by 2014 (2011), http:\/\/www.msnbc.msn.com\/id\/42584660\/ns\/business-press_releases\/"},{"key":"9_CR17","first-page":"56","volume-title":"Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008","author":"N. Saxena","year":"2008","unstructured":"Saxena, N., Uddin, M.B., Voris, J.: Universal device pairing using an auxiliary device. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, pp. 56\u201367. ACM, New York (2008)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2004.241","volume":"37","author":"B.N. Schilit","year":"2004","unstructured":"Schilit, B.N., Sengupta, U.: Device ensembles. Computer\u00a037, 56\u201364 (2004)","journal-title":"Computer"},{"key":"9_CR19","first-page":"13","volume-title":"Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, UIST 2010","author":"D. Schmidt","year":"2010","unstructured":"Schmidt, D., Chehimi, F., Rukzio, E., Gellersen, H.: Phonetouch: a technique for direct phone interaction on surfaces. In: Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, UIST 2010, pp. 13\u201316. ACM, New York (2010)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a01796, pp. 172\u2013182. Springer, Heidelberg (2000)"},{"key":"9_CR21","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1145\/1240624.1240816","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007","author":"J.C. Tang","year":"2007","unstructured":"Tang, J.C., Lin, J., Pierce, J., Whittaker, S., Drews, C.: Recent shortcuts: using recent interactions to support shared activities. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 1263\u20131272. ACM, New York (2007)"},{"key":"9_CR22","unstructured":"Bump Technologies, http:\/\/bu.mp"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. Technical report. In Usable Security, USEC (2007)","DOI":"10.1007\/978-3-540-77366-5_29"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging physical and virtual worlds with electronic tags (1999)","DOI":"10.1145\/302979.303111"},{"issue":"3","key":"9_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Scientific American\u00a0265(3), 66\u201375 (1991)","journal-title":"Scientific American"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1268517.1268539","volume-title":"Proceedings of Graphics Interface, GI 2007","author":"A.D. Wilson","year":"2007","unstructured":"Wilson, A.D., Sarin, R.: Bluetable: connecting wireless mobile devices on interactive surfaces using vision-based handshaking. In: Proceedings of Graphics Interface, GI 2007, pp. 119\u2013125. ACM, New York (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32320-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T12:06:04Z","timestamp":1642766764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32320-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642323195","9783642323201"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32320-1_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}