{"id":"https://openalex.org/W7125917396","doi":"https://doi.org/10.3390/informatics13020021","title":"A Highly Robust Approach to NFC Authentication for Privacy-Sensitive Mobile Payment Services","display_name":"A Highly Robust Approach to NFC Authentication for Privacy-Sensitive Mobile Payment Services","publication_year":2026,"publication_date":"2026-01-28","ids":{"openalex":"https://openalex.org/W7125917396","doi":"https://doi.org/10.3390/informatics13020021"},"language":"en","primary_location":{"id":"doi:10.3390/informatics13020021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics13020021","pdf_url":"https://www.mdpi.com/2227-9709/13/2/21/pdf?version=1769609361","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2227-9709/13/2/21/pdf?version=1769609361","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5118818069","display_name":"Rerkchai Fooprateepsiri","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130811","display_name":"Rajamangala University of Technology Tawan-ok","ror":"https://ror.org/03cvxzw02","country_code":"TH","type":"education","lineage":["https://openalex.org/I10245363","https://openalex.org/I4210130811"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Rerkchai Fooprateepsiri","raw_affiliation_strings":["Innovative Education and Lifelong Learning Institute, Rajamangala University of Technology Tawan-ok, Chonburi 20110, Thailand"],"raw_orcid":"https://orcid.org/0009-0005-3174-9094","affiliations":[{"raw_affiliation_string":"Innovative Education and Lifelong Learning Institute, Rajamangala University of Technology Tawan-ok, Chonburi 20110, Thailand","institution_ids":["https://openalex.org/I4210130811"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029092767","display_name":"U-Koj Plangprasopchoke","orcid":null},"institutions":[{"id":"https://openalex.org/I1285782058","display_name":"Rajamangala University of Technology Isan","ror":"https://ror.org/04a2rz655","country_code":"TH","type":"education","lineage":["https://openalex.org/I1285782058"]},{"id":"https://openalex.org/I4210130811","display_name":"Rajamangala University of Technology Tawan-ok","ror":"https://ror.org/03cvxzw02","country_code":"TH","type":"education","lineage":["https://openalex.org/I10245363","https://openalex.org/I4210130811"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"U-Koj Plangprasopchoke","raw_affiliation_strings":["Business Administration and Information Technology Faculty, Rajamangala University of Technology Tawan-ok, Bangkok 10400, Thailand"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Business Administration and Information Technology Faculty, Rajamangala University of Technology Tawan-ok, Bangkok 10400, Thailand","institution_ids":["https://openalex.org/I4210130811","https://openalex.org/I1285782058"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5118818069"],"corresponding_institution_ids":["https://openalex.org/I4210130811"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15981221,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"21","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.5906000137329102,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.5906000137329102,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.2547999918460846,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.022199999541044235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6607999801635742},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5630000233650208},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5307000279426575},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5174999833106995},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5115000009536743},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4887999892234802},{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.4848000109195709},{"id":"https://openalex.org/keywords/mobile-payment","display_name":"Mobile payment","score":0.4805000126361847},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4433000087738037}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925000190734863},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6607999801635742},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6574000120162964},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5630000233650208},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5307000279426575},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5174999833106995},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5115000009536743},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4887999892234802},{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.4848000109195709},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.4805000126361847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47940000891685486},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4433000087738037},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43529999256134033},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4165000021457672},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.41510000824928284},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.40540000796318054},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.397599995136261},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.3950999975204468},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.38929998874664307},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3785000145435333},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.361299991607666},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.29170000553131104},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/informatics13020021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics13020021","pdf_url":"https://www.mdpi.com/2227-9709/13/2/21/pdf?version=1769609361","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5dac1a57a2c0475199366e31d6d64945","is_oa":true,"landing_page_url":"https://doaj.org/article/5dac1a57a2c0475199366e31d6d64945","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics, Vol 13, Iss 2, p 21 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/informatics13020021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics13020021","pdf_url":"https://www.mdpi.com/2227-9709/13/2/21/pdf?version=1769609361","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125917396.pdf","grobid_xml":"https://content.openalex.org/works/W7125917396.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,61],"rapid":[1],"growth":[2],"of":[3],"mobile":[4,58,155],"payment":[5,59,156],"systems":[6],"has":[7],"positioned":[8],"Near":[9],"Field":[10],"Communication":[11],"(NFC)":[12],"as":[13,39],"a":[14,48,145],"core":[15],"enabling":[16],"technology.":[17],"However,":[18],"conventional":[19],"NFC":[20,154],"protocols":[21],"primarily":[22],"emphasize":[23],"transmission":[24],"efficiency":[25,129],"rather":[26],"than":[27],"robust":[28],"authentication":[29,52],"and":[30,42,50,68,115,130,147,152],"privacy":[31],"protection,":[32],"which":[33],"exposes":[34],"users":[35],"to":[36,89],"threats":[37],"such":[38],"eavesdropping,":[40],"replay,":[41],"tracking":[43,69],"attacks.":[44,117],"In":[45],"this":[46],"study,":[47],"lightweight":[49],"privacy-preserving":[51],"protocol":[53,62,143],"is":[54,87],"proposed":[55,125],"for":[56,77,150],"NFC-based":[57],"services.":[60],"integrates":[63],"anonymous":[64],"authentication,":[65],"replay":[66,116],"resistance,":[67],"protection":[70],"while":[71],"maintaining":[72],"low":[73],"computational":[74],"overhead":[75],"suitable":[76],"resource-constrained":[78],"devices.":[79],"A":[80],"secure":[81,151],"offline":[82],"session":[83],"key":[84],"generation":[85],"mechanism":[86],"incorporated":[88],"enhance":[90],"transaction":[91],"reliability":[92],"without":[93],"increasing":[94],"system":[95],"complexity.":[96],"Formal":[97],"security":[98,132],"verification":[99],"using":[100],"the":[101,124,142],"Scyther":[102],"tool":[103],"(version":[104],"1.1.3)":[105],"confirms":[106],"resistance":[107],"against":[108],"major":[109],"attack":[110],"vectors,":[111],"including":[112],"impersonation,":[113],"man-in-the-middle,":[114],"Comparative":[118],"performance":[119],"analysis":[120],"further":[121],"demonstrates":[122],"that":[123,141],"scheme":[126],"achieves":[127],"superior":[128],"stronger":[131],"guarantees":[133],"compared":[134],"with":[135],"existing":[136],"approaches.":[137],"These":[138],"results":[139],"indicate":[140],"provides":[144],"practical":[146],"scalable":[148],"solution":[149],"privacy-aware":[153],"environments.":[157]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2026-01-29T00:00:00"}
