{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:08:01Z","timestamp":1729638481022,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057870","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T16:58:20Z","timestamp":1426265900000},"page":"133-138","source":"Crossref","is-referenced-by-count":11,"title":["A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys"],"prefix":"10.1109","author":[{"given":"Chalee","family":"Thammarat","sequence":"first","affiliation":[]},{"given":"Roongroj","family":"Chokngamwong","sequence":"additional","affiliation":[]},{"given":"Chian","family":"Techapanupreeda","sequence":"additional","affiliation":[]},{"given":"Supakorn","family":"Kungpisdan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.105"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2012.6408203"},{"key":"ref12","first-page":"203","article-title":"NFC and Its Application to Mobile Payment: Overview and Comparison","author":"sunil","year":"2012","journal-title":"Information Science and Digital Content Technology (ICIDT) 2012"},{"key":"ref13","article-title":"Security in near field communication (NFC)","author":"haselsteiner","year":"2006","journal-title":"Proceedings of Workshop on RFID Security"},{"article-title":"Near Field Communication A survey of safety and security measures","year":"2011","author":"martin","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.014"},{"key":"ref16","article-title":"Practical NFC Peer-to-Peer Relay Attack using Mobile Phones","author":"francis","year":"2010","journal-title":"IACR e-print archive"},{"key":"ref17","first-page":"94","article-title":"Security of the near field communication protocol: an overview","volume":"2","author":"dakota","year":"2013","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"ref18","first-page":"67","article-title":"Near Field Communication Infosys Labs Briefings","volume":"10","author":"agrawal","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0935-5"},{"key":"ref4","article-title":"A Security-enhanced One-time Payment Scheme for Credit Card","author":"li","year":"2004","journal-title":"Proc of the Int' l Workshop on Research Issues on Data Engineering Web Services for E-Commerce and E-G overnment Applications"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31815-6_25","article-title":"A Limited-Used Key Generation Scheme for Internet Transactions","volume":"3325","author":"kungpisdan","year":"2005","journal-title":"Lecture Notes in Computer Scienc e"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46088-8_18"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-3-540-24582-7_22","article-title":"Lightweight Mobile Credit-card Payment Protocol","volume":"2904","author":"kungpisdan","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref8","first-page":"93","article-title":"Near field communication (NFC)","volume":"12","author":"al-ofeishat","year":"2012","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref7","article-title":"A NFC based Authentication method for defense of the Man in the Middle Attack","author":"yun-seok","year":"2013","journal-title":"Proceedings of the 3rd International Conference on Computer Science and Information Technology (ICCSIT&#x2018;2013)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.3.1.25-34"},{"key":"ref1","article-title":"A Secure Offline Key Generation With Protection Against Key Compromise","author":"kungpisdan","year":"2009","journal-title":"Proceedings of the World Multi conference on Systemic Cybernetics and Informatics[C]"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tmp.2012.04.001"},{"key":"ref20","first-page":"56","article-title":"Near Field Communication: A Review","volume":"2","author":"navneet","year":"2013","journal-title":"Int J Adv Innovative Res"},{"key":"ref22","article-title":"Practical Experiences with NFC Security on mobile Phones","volume":"9","author":"damme","year":"2009","journal-title":"Proc RFIDSec08"},{"key":"ref21","first-page":"351","article-title":"Near Field Communication","author":"gerald","year":"2014","journal-title":"Secure Smart Embedded Devices Platforms and Applications"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2015,1,12]]},"location":"Cambodia","end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057870.pdf?arnumber=7057870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:19:50Z","timestamp":1498187990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057870","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}