{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:31:24Z","timestamp":1771065084099,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/comsnets.2014.6734919","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T16:08:18Z","timestamp":1392307698000},"page":"1-6","source":"Crossref","is-referenced-by-count":31,"title":["NFC based secure mobile healthcare system"],"prefix":"10.1109","author":[{"given":"Divyashikha","family":"Sethia","sequence":"first","affiliation":[]},{"given":"Daya","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Tanuj","family":"Mittal","sequence":"additional","affiliation":[]},{"given":"Ujjwal","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Huzur","family":"Saran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A NFC based authentication method for defense of the man in the middle attack","author":"lee","year":"2013","journal-title":"3 Rd International Conference on Computer Science and Information Technology (ICCSIT'2013)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176708"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655090"},{"key":"15","year":"0","journal-title":"Global Platform Specification"},{"key":"16","year":"0","journal-title":"Why Healthcare IT Security Is Harder Than the Rest"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.PERVASIVEHEALTH2008.2534"},{"key":"14","first-page":"628","article-title":"Security in bluetooth, RPID and wireless sensor networks","author":"skpanigrahy","year":"2011","journal-title":"ACM Proceedings on 2011 International Conference on Communication Computing & Security"},{"key":"11","year":"0","journal-title":"Java Card Platform Security"},{"key":"12","year":"0","journal-title":"Smart Card Standards for Contact and Contactless Interfaces"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2011.18"},{"key":"20","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/978-3-642-33167-1_22","article-title":"Secure proximity detection for NFC devices based on ambient sensor data","volume":"7459","author":"halevi","year":"2012","journal-title":"Computer Security - ESORICS 2012 Lecture Notes in Computer Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28540-0_26"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263736"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2009.25"},{"key":"25","first-page":"104","article-title":"Automated NFC enabled Rural Healthcare for reliable patient record maintenance","volume":"182","author":"sethia","year":"2012","journal-title":"Proceedings of Global Telehealth Conference"},{"key":"26","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-540-85893-5_20","article-title":"A practical attack on the MIFARE classic","volume":"5189","author":"de koning gans","year":"2008","journal-title":"Smart Card Research and Advanced Applications LNCS"},{"key":"3","year":"0","journal-title":"Rashtriya Bima Yojana"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2010.10"},{"key":"10","year":"0","journal-title":"GO-Trust\ufffd Secure MicroSD Lava"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0935-5"},{"key":"7","year":"0","journal-title":"M1F ARE Classic IK Specification Document"},{"key":"6","year":"0","journal-title":"NFC Forum Tedchnical Specifications"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379779"},{"key":"4","year":"2012","journal-title":"Smart Card Technology in U S Healthcare Frequently Asked Questions"},{"key":"9","year":"2013","journal-title":"MobilelNFC Security Fundamentals Secure Elements 101"},{"key":"8","year":"0","journal-title":"NFCA on Android"}],"event":{"name":"2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2014,1,6]]},"end":{"date-parts":[[2014,1,10]]}},"container-title":["2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720258\/6734849\/06734919.pdf?arnumber=6734919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:50:49Z","timestamp":1498103449000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6734919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2014.6734919","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}