References
- X. Zhu, S. K. Mukhopadhyay, and H. Kurata, "A Review of RFID Technology and Its Managerial Applications in Different Industries," Journal of Engineering and Technology Management, vol. 29, no. 1, pp. 152-167, 2012. https://doi.org/10.1016/j.jengtecman.2011.09.011
- T.-W. Kan, C.-H. Teng, and M. Y. Chen, "QR Code Based Augmented Reality Applications," in Handbook of Augmented Reality. Springer, pp. 339-354, 2011.
- T. Sun and D. Zhou, "Automatic Identification Technology-Application of Two-dimensional Code," in Automation and Logistics (ICAL), 2011 IEEE International Conference on. IEEE, pp. 164-168, 2011.
- T. J. Soon, "QR Code," Synthesis Journal, pp. 59-78, 2008.
- R. Want, "An Introduction to RFID Technology," Pervasive Computing, IEEE, vol. 5, no. 1, pp. 25-33, 2006. https://doi.org/10.1109/MPRV.2006.2
- C. M. Roberts, "Radio Frequency Identification (RFID)," Computers& Security, vol. 25, no. 1, pp. 18-26, 2006. https://doi.org/10.1016/j.cose.2005.12.003
- B. Nath, F. Reynolds, and R. Want, "RFID Technology and Applications," IEEE Pervasive Computing, vol. 5, no. 1, pp. 22-24, 2006. https://doi.org/10.1109/MPRV.2006.13
- J. Ondrus and Y. Pigneur, "An Assessment of NFC for Future Mobile Payment Systems," in Management of Mobile Business, 2007. ICMB 2007. International Conference on the. IEEE, pp. 43-43, 2007.
- M. Fisher, "Conducting an Online Payment Transaction Using an NFC Enabled Mobile Communication Device,"US Patent 8,352,323, Jan. 8 2013.
- G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "NFC Devices: Security and Privacy," in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on. IEEE, pp. 642-647, 2008.
- J. Haartsen, "Bluetooth-The Universal Radio Interface for Ad Hoc, Wireless Connectivity," Ericsson review, vol. 3, no. 1, pp. 110-117, 1998.
- K. Hozak, "Managerial Guidance for Applying RFID in The Tourism Industry," Interdisciplinary Journal of Contemporary Research in Business, vol. 4, no. 2, pp. 18-30, 2012.
- F. Borrego-Jaraba, I. Luque Ruiz, and M. A. G'omez-Nieto, "A NFC-based Pervasive Solution for City Touristic Surfing," Personal Ubiquitous Comput., vol. 15, no. 7, pp. 731-742, Oct. 2011. https://doi.org/10.1007/s00779-010-0364-y
- J. Pesonen and E. Horster, "Near Field Communication Technology in Tourism," Tourism Management Perspectives, vol. 4, pp. 11-18, 2012. https://doi.org/10.1016/j.tmp.2012.04.001
- B. Ozdenizci, K. Ok, V. Coskun, and M. Aydin, "Development of an Indoor Navigation System Using NFC Technology," in Information and Computing (ICIC), 2011 Fourth International Conference on, pp. 11-14, 2011.
- B. Benyo, A. Vilmos, K. Kovacs, and L. Kutor, "NFC Applications and Business Model ofThe Ecosystem," in Mobile and Wireless Communications Summit, 2007. 16th IST. IEEE, pp. 1-5, 2007.
- J. J. Gummeson, B. Priyantha, D. Ganesan, D. Thrasher, and P. Zhang, "Engarde: Protecting the Mobile Phone from Malicious NFC Interactions," in Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '13. New York, NY, USA: ACM, pp. 445-458, 2013.
- R. Barthel, K. Leder Mackley, A. Hudson-Smith, A. Karpovich, M. Jode, and C. Speed, "An Internet of Old Things as an Augmented Memory System," Personal Ubiquitous Comput., vol. 17, no. 2, pp. 321-333, Feb. 2013. https://doi.org/10.1007/s00779-011-0496-8
- A. Neumann, J. Barnickel, and U. Meyer, "Security and Privacy Implications of URL Shortening Services," in Proceedings of the Workshop on Web, vol. 2, 2011.
- F. Klien and M. Strohmaier, "Short Links Under Attack: Geographical Analysis of Spam in a URL Shortener Network," in Proceedings of the 23rd ACM conference on Hypertext and social media. ACM, pp. 83-88, 2012.
- D. Guinard, C. Floerkemeier, and S. Sarma, "Cloud Computing, REST and Mashups to Simplify RFID Application Development and Deployment," in Proceedings of the Second International Workshop on Web of Things. ACM, p. 9, 2011.