Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = NFC ecosystem

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 1806 KiB  
Article
From Transactions to Transformations: A Bibliometric Study on Technology Convergence in E-Payments
by Priyanka C. Bhatt, Yu-Chun Hsu, Kuei-Kuei Lai and Vinayak A. Drave
Appl. Syst. Innov. 2025, 8(4), 91; https://doi.org/10.3390/asi8040091 - 28 Jun 2025
Viewed by 634
Abstract
This study investigates the convergence of blockchain, artificial intelligence (AI), near-field communication (NFC), and mobile technologies in electronic payment (e-payment) systems, proposing an innovative integrative framework to deconstruct the systemic innovations and transformative impacts driven by such technological synergy. Unlike prior research, which [...] Read more.
This study investigates the convergence of blockchain, artificial intelligence (AI), near-field communication (NFC), and mobile technologies in electronic payment (e-payment) systems, proposing an innovative integrative framework to deconstruct the systemic innovations and transformative impacts driven by such technological synergy. Unlike prior research, which often focuses on single-technology adoption, this study uniquely adopts a cross-technology convergence perspective. To our knowledge, this is the first study to empirically map the multi-technology convergence landscape in e-payment using scientometric techniques. By employing bibliometric and thematic network analysis methods, the research maps the intellectual evolution and key research themes of technology convergence in e-payment systems. Findings reveal that while the integration of these technologies holds significant promise, improving transparency, scalability, and responsiveness, it also presents challenges, including interoperability barriers, privacy concerns, and regulatory complexity. Furthermore, this study highlights the potential for convergent technologies to unintentionally deepen the digital divide if not inclusively designed. The novelty of this study is threefold: (1) theoretical contribution—this study expands existing frameworks of technology adoption and digital governance by introducing an integrated perspective on cross-technology adoption and regulatory responsiveness; (2) practical relevance—it offers actionable, stakeholder-specific recommendations for policymakers, financial institutions, developers, and end-users; (3) methodological innovation—it leverages scientometric and topic modeling techniques to capture the macro-level trajectory of technology convergence, complementing traditional qualitative insights. In conclusion, this study advances the theoretical foundations of digital finance and provides forward-looking policy and managerial implications, paving the way for a more secure, inclusive, and innovation-driven digital payment ecosystem. Full article
(This article belongs to the Topic Social Sciences and Intelligence Management, 2nd Volume)
Show Figures

Figure 1

16 pages, 2004 KiB  
Article
DC-NFC: A Custom Deep Learning Framework for Security and Privacy in NFC-Enabled IoT
by Abdul Rehman, Omar Alharbi, Yazeed Qasaymeh and Amer Aljaedi
Sensors 2025, 25(5), 1381; https://doi.org/10.3390/s25051381 - 24 Feb 2025
Viewed by 843
Abstract
NFC has emerged as a critical technology in IoET ecosystems, facilitating seamless data exchange in proximity-based systems. However, the security and privacy challenges associated with NFC-enabled IoT devices remain significant, exposing them to various threats such as eavesdropping, relay attacks, and spoofing. This [...] Read more.
NFC has emerged as a critical technology in IoET ecosystems, facilitating seamless data exchange in proximity-based systems. However, the security and privacy challenges associated with NFC-enabled IoT devices remain significant, exposing them to various threats such as eavesdropping, relay attacks, and spoofing. This paper introduces DC-NFC, a novel deep learning framework designed to enhance the security and privacy of NFC communications within IoT environments. The proposed framework integrates three innovative components: the CE for capturing intricate temporal and spatial patterns, the PML for enforcing end-to-end privacy constraints, and the ATF module for real-time threat detection and dynamic model adaptation. Comprehensive experiments were conducted on four benchmark datasets—UNSW-NB15, Bot-IoT, TON-IoT Telemetry, and Edge-IIoTset. The results of the proposed approach demonstrate significant improvements in security metrics across all datasets, with accuracy enhancements up to 95% on UNSW-NB15, and consistent F1-scores above 0.90, underscoring the framework’s robustness in enhancing NFC security and privacy in diverse IoT environments. The simulation results highlight the framework’s real-time processing capabilities, achieving low latency of 20.53 s for 1000 devices on the UNSW-NB15 dataset. Full article
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2024)
Show Figures

Figure 1

13 pages, 3350 KiB  
Article
The Relationships of Supporting Services and Regulating Services in National Forest City
by Qiongrui Zhang, Linyishu Yang and Songjun Xu
Forests 2022, 13(9), 1368; https://doi.org/10.3390/f13091368 - 27 Aug 2022
Cited by 6 | Viewed by 1827
Abstract
The establishment of national forest city (NFC) is to regulate the urban climate and realize the integrated development of urban and rural areas. We explored the changes and relationships between ecosystem supporting services and regulating services before and after the construction of NFC [...] Read more.
The establishment of national forest city (NFC) is to regulate the urban climate and realize the integrated development of urban and rural areas. We explored the changes and relationships between ecosystem supporting services and regulating services before and after the construction of NFC in the Pearl River Delta urban agglomeration (PRD). InVEST and CASA models were used to evaluate five ecosystem services (ESs), and correlation analysis was used to analyze the relationship between ESs. The results showed that (1) Construction land increased significantly from 2005 to 2020, while cultivated land decreased the most, followed by woodland. (2) All ESs except NPP decreased from 2005 to 2020 in the PRD. (3) There was a synergistic relationship between supporting service and regulating service, and their internal services are positively correlated. This study proved the guaranteed effect of supporting services on regulating services, and we found that the construction of NFC can restrain the decline of ESs. Based on the above results, we proposed nature- based solutions for the development of forest cities. Full article
(This article belongs to the Special Issue Multiple-Use and Ecosystem Services of Forests)
Show Figures

Figure 1

58 pages, 1947 KiB  
Review
The Survey on Near Field Communication
by Vedat Coskun, Busra Ozdenizci and Kerem Ok
Sensors 2015, 15(6), 13348-13405; https://doi.org/10.3390/s150613348 - 5 Jun 2015
Cited by 96 | Viewed by 27135
Abstract
Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of [...] Read more.
Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem. Full article
(This article belongs to the Section Remote Sensors)
Show Figures

Graphical abstract

14 pages, 523 KiB  
Article
Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC
by Jungho Kang, Jong Hyuk Park and Sangkee Suk
Symmetry 2015, 7(2), 935-948; https://doi.org/10.3390/sym7020935 - 2 Jun 2015
Cited by 6 | Viewed by 5791
Abstract
At the center of core technologies for a future cyber world, such as Internet of Things (IoT) or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC)-based [...] Read more.
At the center of core technologies for a future cyber world, such as Internet of Things (IoT) or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC)-based electronic payments. Near-field Communication (NFC) integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM) that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works. Full article
Show Figures

Back to TopTop