A Survey on Near Field Communication (NFC) Technology, Wireless Personal Communications, vol.12, issue.5, pp.2259-2294, 2013. ,
DOI : 10.1007/s11277-012-0935-5
Practical attack on contactless payment cards, HCI2011 Workshop-Heath, Wealth and Identity Theft, 2011. ,
Hacking the nfc credit cards for fun and debit, Hackito Ergo Sum conference, 2012. ,
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
DOI : 10.1109/CSFW.1997.596782
Operational semantics and verification of security protocols, 2012. ,
DOI : 10.1007/978-3-540-78636-8