{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:06:14Z","timestamp":1758845174527,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/ssd.2014.6808780","type":"proceedings-article","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T16:50:18Z","timestamp":1399481418000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Employing smartphones Xenon flashlight for mobile payment"],"prefix":"10.1109","author":[{"given":"Mariam M.","family":"Galal","sequence":"first","affiliation":[]},{"given":"Ahmed Abd","family":"El Aziz","sequence":"additional","affiliation":[]},{"given":"Heba A.","family":"Fayed","sequence":"additional","affiliation":[]},{"given":"Moustafa H.","family":"Aly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NORPI2 Datasheet","article-title":"Light dependent resistors","year":"1997","key":"13"},{"journal-title":"BPW21 datasheet","article-title":"Silicon photodiode for the visible spectral range","year":"2007","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2013.23"},{"key":"12","article-title":"Information technology-Identification cards-Financial transaction cards","volume":"7813","year":"2006","journal-title":"ISO\/IEC"},{"key":"3","first-page":"41","article-title":"Mobile payment systems","volume":"6","author":"blochlinger","year":"2012","journal-title":"Internet Economics"},{"journal-title":"Mobile Money and Payment A Literature Review Based on Academic and Practitioner-oriented Publications","year":"2001","author":"diniz","key":"2"},{"key":"1","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/978-3-642-01516-8_27","article-title":"Working overtime: Patterns of smartphone and PC usage in the day of an information worker","author":"karlson","year":"2009","journal-title":"Proceedings of Pervasive Computing"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1613858.1613965"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1936652.1936679"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2013.6482441"},{"journal-title":"S Inc","year":"2009","key":"5"},{"journal-title":"G Inc","year":"2012","key":"4"},{"journal-title":"Aeronautics and Space","year":"2010","key":"9"},{"key":"8","first-page":"57","article-title":"Bluetooth hacking: A case study","author":"browning","year":"2009","journal-title":"Proceedings of the Conference on Digital Forensics Security and Law"}],"event":{"name":"2014 11th International Multi-Conference on Systems, Signals & Devices (SSD)","start":{"date-parts":[[2014,2,11]]},"location":"Castelldefels-Barcelona, Spain","end":{"date-parts":[[2014,2,14]]}},"container-title":["2014 IEEE 11th International Multi-Conference on Systems, Signals &amp; Devices (SSD14)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6802828\/6808745\/06808780.pdf?arnumber=6808780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T04:21:04Z","timestamp":1565410864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6808780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ssd.2014.6808780","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}