Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065 - 26 October 2021

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC… More >

  • Open Access

    ARTICLE

    Security Threats to Business Information Systems Using NFC Read/Write Mode

    Sergio Rios-Aguilar1,2,*, Marta Beltrán2, González-Crespo Rubén3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2955-2969, 2021, DOI:10.32604/cmc.2021.014969 - 01 March 2021

    Abstract Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either device-to-device or tag-to-device. One of the three main operation modes of NFC, called read/write mode, makes use of the latter type of interaction. It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats, such as plain text, simple URLs or enriched URLs. Using a wide variety… More >

  • Open Access

    ARTICLE

    Multiple Scattering Between Adjacent Sound Sources in Head-Related Transfer Function Measurement System

    Guangzheng Yu1,*, Yu Liu1,2, Bosun Xie1, Huali Zhou1

    Sound & Vibration, Vol.53, No.4, pp. 151-159, 2019, DOI:10.32604/sv.2019.04644

    Abstract To accelerate head-related transfer functions (HRTFs) measurement, two or more independent sound sources are usually employed in the measurement system. However, the multiple scattering between adjacent sound sources may influence the accuracy of measurement. On the other hand, the directivity of sound source could induce measurement error. Therefore, a model consisting of two spherical sound sources with approximate omni-directivity and a rigid-spherical head is proposed to evaluate the errors in HRTF measurement caused by multiple scattering between sources. An example of analysis using multipole re-expansion indicates that the error of ipsilateral HRTFs are within the More >

  • Open Access

    ARTICLE

    Coupling of BEM/FEM for Time Domain Structural-Acoustic Interaction Problems

    S.T. Lie1, Guoyou Yu, Z. Zhao2

    CMES-Computer Modeling in Engineering & Sciences, Vol.2, No.2, pp. 171-182, 2001, DOI:10.3970/cmes.2001.002.171

    Abstract The BEM/FEM coupling procedure is applied to 2-D time domain structural-acoustic interaction problems. The acoustic domain for fluid or air is modeled by BEM scheme that is suitable for both finite and infinite domains, while the structure is modeled by FEM scheme. The input impact, which can be either plane waves or non-plane waves, can either be forces acting directly on the structural-acoustic system or be explosion sources. The far field or near field explosion sources which are difficult to be simulated by finite element modeling, can be simulated exactly by boundary element modeling as More >

Displaying 1-10 on page 1 of 4. Per Page