{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:16:38Z","timestamp":1764587798227,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,11]]},"DOI":"10.1145\/2837126.2837138","type":"proceedings-article","created":{"date-parts":[[2016,4,12]],"date-time":"2016-04-12T12:23:12Z","timestamp":1460463792000},"page":"140-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Physical Access with NFC-enabled Smartphones"],"prefix":"10.1145","author":[{"given":"Chrstof","family":"Arnosti","sequence":"first","affiliation":[{"name":"Bixi Systems AG, Grossfeldstrasse 3, 8887 Mels, Switzerland"}]},{"given":"Dominik","family":"Gruntz","sequence":"additional","affiliation":[{"name":"Institute for Mobile and Distributed Systems, UAS Northwestern Switzerland (FHNW), Bahnhofstrasse 6, 5210 Windisch, Switzerland"}]},{"given":"Marco","family":"Hauri","sequence":"additional","affiliation":[{"name":"Bixi Systems AG, Grossfeldstrasse 3, 8887 Mels, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android open source project. Android keystore system. https:\/\/developer.android.com\/training\/articles\/keystore.html. Accessed: 2015-08-21.  Android open source project. Android keystore system. https:\/\/developer.android.com\/training\/articles\/keystore.html. Accessed: 2015-08-21."},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"24","volume":"8","author":"Arnosti C.","year":"2014","unstructured":"C. Arnosti and D. Gruntz . Man-in-the-Middle: Analyse des Datenverkehrs bei NFC-Zahlungen. IMVS Fokus Report , 8 ( 1 ): 24 -- 31 , 2014 . C. Arnosti and D. Gruntz. Man-in-the-Middle: Analyse des Datenverkehrs bei NFC-Zahlungen. IMVS Fokus Report, 8(1):24--31, 2014.","journal-title":"Man-in-the-Middle: Analyse des Datenverkehrs bei NFC-Zahlungen. IMVS Fokus Report"},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/devifi.netfirms.com\/devifi.com\/assets\/DeviceFidelity_CredenSE.pdf","author":"DeviceFidelity Inc. CredenSE 2.10j classic is NFC card-emulation and certified JavaCard SE in a MicroSD.","year":"2013","unstructured":"DeviceFidelity Inc. CredenSE 2.10j classic is NFC card-emulation and certified JavaCard SE in a MicroSD. http:\/\/devifi.netfirms.com\/devifi.com\/assets\/DeviceFidelity_CredenSE.pdf , 2013 . DeviceFidelity Inc. CredenSE 2.10j classic is NFC card-emulation and certified JavaCard SE in a MicroSD. http:\/\/devifi.netfirms.com\/devifi.com\/assets\/DeviceFidelity_CredenSE.pdf, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_13"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07","author":"Drimer S.","year":"2007","unstructured":"S. Drimer and S. J. Murdoch . Keep your enemies close: Distance bounding against smartcard relay attacks . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07 , pages 7: 1 -- 7 :16, Berkeley, CA, USA , 2007 . S. Drimer and S. J. Murdoch. Keep your enemies close: Distance bounding against smartcard relay attacks. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, pages 7:1--7:16, Berkeley, CA, USA, 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Android Security Internals: An In-Depth Guide to Android's Security Architecture","author":"Elenkov N.","year":"2014","unstructured":"N. Elenkov . Android Security Internals: An In-Depth Guide to Android's Security Architecture . No Starch Press, San Francisco, CA, USA , 1 st edition, 2014 . N. Elenkov. Android Security Internals: An In-Depth Guide to Android's Security Architecture. No Starch Press, San Francisco, CA, USA, 1st edition, 2014.","edition":"1"},{"key":"e_1_3_2_1_8_1","author":"Janssen T.","year":"2014","unstructured":"T. Janssen and M. Zandstra . HCE security implications. Technical report, UL Transaction Security , 2014 . T. Janssen and M. Zandstra. HCE security implications. Technical report, UL Transaction Security, 2014.","journal-title":"HCE security implications. Technical report, UL Transaction Security"},{"key":"e_1_3_2_1_9_1","unstructured":"Kaba. Mobile access solutions. http:\/\/www.kaba.com\/en\/kaba\/innovation\/654636\/mobile-access-solutions.html.  Kaba. Mobile access solutions. http:\/\/www.kaba.com\/en\/kaba\/innovation\/654636\/mobile-access-solutions.html."},{"key":"e_1_3_2_1_10_1","volume-title":"NFC Hacking: The Easy Way","author":"Lee E.","year":"2011","unstructured":"E. Lee . NFC Hacking: The Easy Way , 2011 . E. Lee. NFC Hacking: The Easy Way, 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2774984"},{"key":"e_1_3_2_1_12_1","unstructured":"NFC World. NFC phones: The definitive list. http:\/\/www.nfcworld.com\/nfc-phones-list. Last updated on 21 August 2015.  NFC World. NFC phones: The definitive list. http:\/\/www.nfcworld.com\/nfc-phones-list. Last updated on 21 August 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-013-0157-x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2013.6482441"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2013.6482448"},{"key":"e_1_3_2_1_16_1","unstructured":"Swisscom. The swiss wallet of tomorrow. http:\/\/www.tapit.ch\/en.  Swisscom. The swiss wallet of tomorrow. http:\/\/www.tapit.ch\/en."},{"volume-title":"A new approach to access control","author":"AB.","key":"e_1_3_2_1_17_1","unstructured":"Telcred AB. A new approach to access control . http:\/\/telcred.com. Accessed: 2015-08-20. Telcred AB. A new approach to access control. http:\/\/telcred.com. Accessed: 2015-08-20."}],"event":{"name":"MoMM 2015: The 13th International Conference on Advances in Mobile Computing and Multimedia","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"],"location":"Brussels Belgium","acronym":"MoMM 2015"},"container-title":["Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837126.2837138","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837126.2837138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:21Z","timestamp":1750225401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837126.2837138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":16,"alternative-id":["10.1145\/2837126.2837138","10.1145\/2837126"],"URL":"https:\/\/doi.org\/10.1145\/2837126.2837138","relation":{},"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"2015-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}