{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:11:59Z","timestamp":1774627919663,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T00:00:00Z","timestamp":1377561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,27]]},"DOI":"10.1145\/2486001.2486037","type":"proceedings-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T08:31:21Z","timestamp":1376382681000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["Dhwani"],"prefix":"10.1145","author":[{"given":"Rajalakshmi","family":"Nandakumar","sequence":"first","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]},{"given":"Krishna Kant","family":"Chintalapudi","sequence":"additional","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]},{"given":"Venkat","family":"Padmanabhan","sequence":"additional","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]},{"given":"Ramarathnam","family":"Venkatesan","sequence":"additional","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2013,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Wimbeep. https:\/\/sites.google.com\/site\/wimbeep\/.  Wimbeep. https:\/\/sites.google.com\/site\/wimbeep\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Zoosh. http:\/\/www.naratte.com\/.  Zoosh. http:\/\/www.naratte.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Advanced Encryption Standard (AES) Nov 2001. U.S. Federal Information Processing Standard Publication 197 http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf.  Advanced Encryption Standard (AES) Nov 2001. U.S. Federal Information Processing Standard Publication 197 http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"ECMA-340 Standard","author":"Communication Interface Near Field","unstructured":"Near Field Communication Interface and Protocol (NFCIP-1), Dec 2004. ECMA-340 Standard ( 2 nd Edition), http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-340.htm. Near Field Communication Interface and Protocol (NFCIP-1), Dec 2004. ECMA-340 Standard (2nd Edition), http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-340.htm.","edition":"2"},{"key":"e_1_3_2_1_5_1","unstructured":"NFC-SEC Whitepaper Dec 2008. http:\/\/www.ecma-international.org\/activities\/Communications\/tc47--2008-089.pdf.  NFC-SEC Whitepaper Dec 2008. http:\/\/www.ecma-international.org\/activities\/Communications\/tc47--2008-089.pdf."},{"key":"e_1_3_2_1_6_1","volume-title":"Jun","year":"2010","unstructured":"NFC-SEC-01 : NFC-SEC Cryptography Standard using ECDH and AES , Jun 2010 . ECMA-386 Standard (2nd Edition) , http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-386.htm. NFC-SEC-01: NFC-SEC Cryptography Standard using ECDH and AES, Jun 2010. ECMA-386 Standard (2nd Edition), http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-386.htm."},{"key":"e_1_3_2_1_7_1","volume-title":"Jun","year":"2010","unstructured":"NFC-SEC : NFCIP-1 Security Services and Protocol , Jun 2010 . ECMA-385 Standard (2nd Edition) , http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-385.htm. NFC-SEC: NFCIP-1 Security Services and Protocol, Jun 2010. ECMA-385 Standard (2nd Edition), http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-385.htm."},{"key":"e_1_3_2_1_8_1","unstructured":"Start-Up Naratte Launches Novel Ultrasonic Near-Field Communications Solution Jul 2011. http:\/\/www.bdti.com\/InsideDSP\/2011\/07\/28\/Naratte.  Start-Up Naratte Launches Novel Ultrasonic Near-Field Communications Solution Jul 2011. http:\/\/www.bdti.com\/InsideDSP\/2011\/07\/28\/Naratte."},{"key":"e_1_3_2_1_9_1","unstructured":"86% of POS terminals in North America will accept NFC payments by 2017 Jun 2012. http:\/\/www.nfcworld.com\/2012\/06\/07\/316112\/berg-86-percent-of-pos-terminals-in-north-america-will-accept-nfc-payments-by-2017\/.  86% of POS terminals in North America will accept NFC payments by 2017 Jun 2012. http:\/\/www.nfcworld.com\/2012\/06\/07\/316112\/berg-86-percent-of-pos-terminals-in-north-america-will-accept-nfc-payments-by-2017\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Mar","author":"At Villanova University","year":"2012","unstructured":"At Villanova University , NFC Technology Being Tested , Mar 2012 . http:\/\/www.todaysfacilitymanager.com\/2012\/03\/at-villanova-university-nfc-technology-being-tested. At Villanova University, NFC Technology Being Tested, Mar 2012. http:\/\/www.todaysfacilitymanager.com\/2012\/03\/at-villanova-university-nfc-technology-being-tested."},{"key":"e_1_3_2_1_11_1","unstructured":"NFC specialist Tapit to raise US\\$8m for international expansion Jul 2012. http:\/\/www.nfcworld.com\/2012\/07\/26\/317057\/nfc-specialist-tapit-to-raise-us8m-for-international-expansion\/.  NFC specialist Tapit to raise US\\$8m for international expansion Jul 2012. http:\/\/www.nfcworld.com\/2012\/07\/26\/317057\/nfc-specialist-tapit-to-raise-us8m-for-international-expansion\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_3_2_1_13_1","volume-title":"Workshop on RFID Security","author":"Haselsteiner E.","year":"2006","unstructured":"E. Haselsteiner and K. Breitfuss . Security in Near Field Communication (NFC) . In Workshop on RFID Security , Jul 2006 . E. Haselsteiner and K. Breitfuss. Security in Near Field Communication (NFC). In Workshop on RFID Security, Jul 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030647"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_16_1","volume-title":"Eavesdropping Near Field Communication. In The Norwegian Information Security Conference (NISK)","author":"Kortvedt H.","year":"2009","unstructured":"H. Kortvedt and S. Mjolsnes . Eavesdropping Near Field Communication. In The Norwegian Information Security Conference (NISK) , Nov 2009 . H. Kortvedt and S. Mjolsnes. Eavesdropping Near Field Communication. In The Norwegian Information Security Conference (NISK), Nov 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.50"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514298"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"C. E. Shannon. Communication Theory of Secrecy Systems. Bell Systems Technical Journal 1949 28","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_21_1","first-page":"54","year":"1974","unstructured":"A. Wyner. The Wire-Tap Channel. Bell Systems Technical Journal , 54 , 1974 . A. Wyner. The Wire-Tap Channel. Bell Systems Technical Journal, 54, 1974.","journal-title":"A. Wyner. The Wire-Tap Channel. Bell Systems Technical Journal"}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","location":"Hong Kong China","acronym":"SIGCOMM'13","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2486037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2486001.2486037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:48:40Z","timestamp":1750222120000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2486037"}},"subtitle":["secure peer-to-peer acoustic NFC"],"short-title":[],"issued":{"date-parts":[[2013,8,27]]},"references-count":21,"alternative-id":["10.1145\/2486001.2486037","10.1145\/2486001"],"URL":"https:\/\/doi.org\/10.1145\/2486001.2486037","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2534169.2486037","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,8,27]]},"assertion":[{"value":"2013-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}