نتایج جستجو برای: nfc

تعداد نتایج: 1270  

2015
T. Ma Y. Tu N. F. Zhang K. D. Deng Q. Y. Diao

This study aimed to investigate the effect of the ratio of non-fibrous carbohydrates to neutral detergent fibre (NFC/NDF) and undegraded dietary protein (UDP) on rumen fermentation and nitrogen metabolism in lambs. Four Dorper×thin-tailed Han crossbred lambs, averaging 62.3±1.9 kg of body weight and 10 mo of age, were randomly assigned to four dietary treatments of combinations of two levels of...

2010
Lishoy Francis Gerhard Hancke Keith Mayes Konstantinos Markantonakis

In this paper, we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded secure element (SE), could be used as a mobile token cloning and skimming platform. We show how an attacker could use an NFC mobile phone as such an attack platform by exploiting the existing security controls of the embedded SE and the available contactless APIs. To illust...

2012
Tzipora Halevi Di Ma Nitesh Saxena Tuo Xiang

In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context of an NFC transaction, the bank server can validate the transaction if both the NFC phone and reader are precisely at the same location thereby preventing a form of a devastating relay attack against such systems. In ...

2014
Shin Kamada Takumi Ichimura Tetsuya Shigeyasu Yasuhiko Takemoto

ABSTRACT Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the uni...

2014
Desh Bhagat

With increase in the unauthorized users access, it is required to increase the security in the Near Field Communication (NFC). In the paper we propose a user behavior based enhanced protocol entitled ‘User Behavior based Enhanced Protocol (UBEP)’ to increase the security in NFC enabled devices. The UBEP works on the history of interaction of a user with system.The propose protocol considers fou...

2009
Thomas Wiechert Andreas Schaller Frédéric Thiesse Elgar Fleisch

This paper presents the results of a survey conducted amongst European retailers on their plans and perceptions with regard to novel applications based on Near Field Communication (NFC) technology. Whilst the survey showed that retailers did evaluate the possible applications differently, none of them clearly stood out as the most beneficial one. NFC based services were on average conceded to b...

Journal: :Wireless Personal Communications 2013
Vedat Coskun Busra Ozdenizci Kerem Ok

Near Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and loyalty applications to access keys for offices and houses. Eventually NFC technology integrates all such services into one single mobile phone. NFC technology has emerged latel...

Journal: :Cyberpsychology, behavior and social networking 2013
Danny Tengti Kao Shih-Chieh Chuang Sui-Min Wang Lei Zhang

Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates pa...

Journal: :The Journal of the Acoustical Society of America 2015
Varsha H Rallapalli Joshua M Alexander

The Neural-Scaled Entropy (NSE) model quantifies information in the speech signal that has been altered beyond simple gain adjustments by sensorineural hearing loss (SNHL) and various signal processing. An extension of Cochlear-Scaled Entropy (CSE) [Stilp, Kiefte, Alexander, and Kluender (2010). J. Acoust. Soc. Am. 128(4), 2112-2126], NSE quantifies information as the change in 1-ms neural firi...

2014
Maryam Mehrnezhad Feng Hao Siamak F. Shahandashti M. Mehrnezhad S. F. Shahandashti

The reader-and-ghost attack is a real concern in mobile NFC payment applications. A malicious reader relays the user's NFC-enabled mobile phone to a remote legitimate reader to charge for a higher amount than what the user expects to pay. Using an NFC shield cannot prevent the attack, since the user consciously instantiates the NFC payment, though without realizing that the reader is controlled...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید