V. Coskun, B. Ozdenizci, and K. Ok, A Survey on Near Field Communication (NFC) Technology, Wireless Personal Communications, vol.12, issue.5, pp.2259-2294, 2013.
DOI : 10.1007/s11277-012-0935-5

M. Emms and A. Van-moorsel, Practical attack on contactless payment cards, HCI2011 Workshop-Heath, Wealth and Identity Theft, 2011.

R. Lifchitz, Hacking the nfc credit cards for fun and debit, Hackito Ergo Sum conference, 2012.

C. J. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 2008.
DOI : 10.1007/978-3-540-70545-1_38

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.
DOI : 10.1109/CSFW.1997.596782

C. Cremers and S. Mauw, Operational semantics and verification of security protocols, 2012.
DOI : 10.1007/978-3-540-78636-8