{"id":"https://openalex.org/W4297858864","doi":"https://doi.org/10.29007/rxgl","title":"The Survey of Data Stealing on Virtual School Based on NFC","display_name":"The Survey of Data Stealing on Virtual School Based on NFC","publication_year":2022,"publication_date":"2022-09-20","ids":{"openalex":"https://openalex.org/W4297858864","doi":"https://doi.org/10.29007/rxgl"},"language":"en","primary_location":{"id":"doi:10.29007/rxgl","is_oa":true,"landing_page_url":"https://doi.org/10.29007/rxgl","pdf_url":"https://easychair.org/publications/open/fqqXt","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://easychair.org/publications/open/fqqXt","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084597248","display_name":"Andrew Martin Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Andrew Martin Tan","raw_affiliation_strings":["Bina Nusantara University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University, Indonesia","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063562816","display_name":"Filip Beniah Anggara","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Filip Beniah Anggara","raw_affiliation_strings":["Bina Nusantara University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University, Indonesia","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034143754","display_name":"Jennifer Goldwin","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Jennifer Goldwin","raw_affiliation_strings":["Bina Nusantara University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University, Indonesia","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080606292","display_name":"Ford Lumban Gaol","orcid":"https://orcid.org/0000-0002-5116-5708"},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Ford Lumban Gaol","raw_affiliation_strings":["Bina Nusantara University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University, Indonesia","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047425458","display_name":"Tanty Oktavia","orcid":"https://orcid.org/0000-0001-6453-9775"},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Tanty Oktavia","raw_affiliation_strings":["Bina Nusantara University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University, Indonesia","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063864785","display_name":"Chew Fong Peng","orcid":"https://orcid.org/0000-0002-7876-7979"},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Chew Fong Peng","raw_affiliation_strings":["Bina Nusantara University, Indonesia","Malaya University, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University, Indonesia","institution_ids":["https://openalex.org/I166073570"]},{"raw_affiliation_string":"Malaya University, Kuala Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035138418","display_name":"Suzanna Suzanna","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suzanna Suzanna","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5084597248"],"corresponding_institution_ids":["https://openalex.org/I166073570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16717058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"81","issue":null,"first_page":"165","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10888","display_name":"Augmented Reality Applications","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7105596661567688},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7035691142082214},{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.5847158432006836},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.5294570326805115},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.46879372000694275},{"id":"https://openalex.org/keywords/data-exchange","display_name":"Data exchange","score":0.4532318413257599},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4452122151851654},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4326792061328888},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4037870168685913},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24018898606300354},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2093602418899536},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17554867267608643},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12142446637153625}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7105596661567688},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7035691142082214},{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.5847158432006836},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.5294570326805115},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.46879372000694275},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.4532318413257599},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4452122151851654},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4326792061328888},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4037870168685913},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24018898606300354},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2093602418899536},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17554867267608643},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12142446637153625},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.29007/rxgl","is_oa":true,"landing_page_url":"https://doi.org/10.29007/rxgl","pdf_url":"https://easychair.org/publications/open/fqqXt","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.29007/rxgl","is_oa":true,"landing_page_url":"https://doi.org/10.29007/rxgl","pdf_url":"https://easychair.org/publications/open/fqqXt","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4297858864.pdf","grobid_xml":"https://content.openalex.org/works/W4297858864.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W57433761","https://openalex.org/W1492301824","https://openalex.org/W1561098430","https://openalex.org/W1592854796","https://openalex.org/W1986229570","https://openalex.org/W1986781756","https://openalex.org/W1992085202","https://openalex.org/W1999077548","https://openalex.org/W2025128926","https://openalex.org/W2039899552","https://openalex.org/W2075937691","https://openalex.org/W2122122381","https://openalex.org/W2137792823","https://openalex.org/W2149003305","https://openalex.org/W2920733670","https://openalex.org/W3097314621","https://openalex.org/W3184425500","https://openalex.org/W6678361714","https://openalex.org/W6681927388","https://openalex.org/W7009961937"],"related_works":["https://openalex.org/W2604111946","https://openalex.org/W2387170932","https://openalex.org/W2016012107","https://openalex.org/W2465469659","https://openalex.org/W2977676551","https://openalex.org/W2528761823","https://openalex.org/W3176354488","https://openalex.org/W2969916252","https://openalex.org/W4200365138","https://openalex.org/W3041267367"],"abstract_inverted_index":{"In":[0,66],"this":[1,166,211],"Digital":[2],"Era,":[3],"we":[4,236],"are":[5,46,71],"facing":[6],"a":[7,134,161,184,201,208,217],"lot":[8,123,135,162,218],"of":[9,16,33,80,102,124,219,227],"threats":[10],"to":[11,41,74,87,175,189,229],"protect":[12],"our":[13,103],"data.":[14],"One":[15],"the":[17,21,78,81,92,99,119,141,149,158,169,172,233],"latest":[18],"technology":[19,34],"on":[20,148,207],"short":[22],"raneg":[23],"communication":[24],"is":[25,98,105,156,200,205],"Near-Field":[26],"Communication":[27],"(NFC)":[28],"with":[29,154],"so":[30],"many":[31],"implications":[32],"that":[35,97,113,130,157,204,235],"ranging":[36],"from":[37,91],"Non-physical":[38],"access":[39],"control":[40],"digital":[42],"payments.":[43],"These":[44,222],"applications":[45],"frequently":[47],"proclaimed":[48],"as":[49,53,83,179],"being":[50],"more":[51,163,231],"secure,":[52],"they":[54,84,138,180],"require":[55,85],"near":[56],"physical":[57],"vicinity":[58],"and":[59,144,165],"don't":[60,237],"include":[61],"Wi-Fi":[62],"or":[63],"versatile":[64],"systems.":[65],"any":[67,177,191],"case,":[68,210],"these":[69],"frameworks":[70],"still":[72],"defenseless":[73],"security":[75],"assaults":[76],"at":[77],"time":[79],"exchange,":[82],"small":[86],"no":[88,195],"extra":[89],"confirmation":[90],"user\u2019s":[93],"end.":[94],"The":[95,152],"problem":[96,153,234],"main":[100],"concern":[101],"paper":[104,203],"about":[106,232],"NFC":[107,128,155],"Data":[108],"Stealing.":[109],"Not":[110],"everyone":[111],"realized":[112],"their":[114,146],"data":[115,132,159,178,193],"get":[116],"stolen":[117],"by":[118,127],"Cyber":[120],"Criminal.":[121],"A":[122],"people":[125],"complacent":[126],"Technology":[129],"makes":[131],"transmission":[133],"easier,":[136],"but":[137],"only":[139],"see":[140],"good":[142],"side":[143],"close":[145],"eyes":[147],"bad":[150],"side.":[151],"becomes":[160],"accessible,":[164],"opens":[167,183],"wide":[168],"windows":[170],"for":[171,187],"cyber":[173],"criminals":[174],"steal":[176,190],"like.":[181],"This":[182],"new":[185],"window":[186],"them":[188],"personal":[192],"in":[194],"time.":[196],"Our":[197],"research":[198],"method":[199,212],"survey":[202],"based":[206],"real-life":[209],"can":[213],"help":[214,225],"us":[215,228],"identify":[216],"case":[220],"types.":[221],"findings":[223],"may":[224],"all":[226],"understand":[230],"even":[238],"realize.":[239]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
