ITU sees 5 billion mobile subscriptions globally in 2010 ,
Japan's ubiquitous mobile information society, info, vol.6, issue.4, 2004. ,
DOI : 10.1108/14636690110422258
Dutch deal paves way for mobile payments in 2012 ,
Bank of China and China UnionPay launch mobile proximity payments ,
Secure payment with NFC mobile phone in the SmartTouch project, 2008 International Symposium on Collaborative Technologies and Systems, 2008. ,
DOI : 10.1109/CTS.2008.4543921
Near-field communication-based secure mobile payment service, Proceedings of the 11th International Conference on Electronic Commerce, ICEC '09, 2009. ,
DOI : 10.1145/1593254.1593276
Practical NFC Peerto-Peer Relay Attack using Mobile Phones, Workshop on RFID Security, 2010. ,
DOI : 10.1007/978-3-642-16822-2_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.1413
Security in Near Field Communication, Proc. Workshop on RFID Security, 2006. ,
Short-range wireless technologies with mobile payments systems, Proceedings of the 6th international conference on Electronic commerce , ICEC '04, 2004. ,
DOI : 10.1145/1052220.1052302
Bluetooth as an enabling technology in mobile transactions, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, 2005. ,
DOI : 10.1109/ITCC.2005.98
Securing Bluetooth-based payment system using honeypot, 2009 International Conference on Innovations in Information Technology (IIT), 2009. ,
DOI : 10.1109/IIT.2009.5413764
P2P-Paid: A Peer-to-Peer Wireless Payment System, Second IEEE International Workshop on Mobile Commerce and Services ,
DOI : 10.1109/WMCS.2005.16
Security Weaknesses in Bluetooth, Proc. CT-RSA 2001, pp.176-191, 2001. ,
DOI : 10.1007/3-540-45353-9_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7357
Exploring consumer adoption of mobile payments ??? A qualitative study, The Journal of Strategic Information Systems, vol.16, issue.4, pp.413-432, 2007. ,
DOI : 10.1016/j.jsis.2007.08.001
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Proc. Financial Cryptography and Data Security, 2008. ,
DOI : 10.1007/978-3-540-77366-5_11
Hijacking Mobile Data Connec- tions. http://www.blackhat.com/presentations/bh-europe-09, Europe-2009-Gassira-Piccirillo-Hijacking-Mobile- Data-Connections-whitepaper.pdf ,
NFC Devices: Security and Privacy, 2008 Third International Conference on Availability, Reliability and Security, 2008. ,
DOI : 10.1109/ARES.2008.105
Mobile Malware Evolution: An Overview, Part 3, 204792080. ,
Is It Finally Time to Worry about Mobile Malware?, Computer, vol.41, issue.5, pp.12-14, 2008. ,
DOI : 10.1109/MC.2008.159
Can you infect me now?, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07 ,
DOI : 10.1145/1314389.1314402
From EMV to NFC: the contactless trail?, Card Technology Today, vol.20, issue.3, 2008. ,
DOI : 10.1016/S0965-2590(08)70077-X
Phish and Chips, Security Protocols Workshop, 2006. ,
DOI : 10.1007/978-3-642-04904-0_7
Man-in-the-mobile. http://securityblog.s21sec.com/ 2010/09/zeus-mitmo-man-in-mobile-i.html 27. RSA Lab Making Sense of Man-in-the-browser Attacks ,
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey, Journal of Computer Security, vol.19, issue.1, 2010. ,
DOI : 10.3233/JCS-2010-0403
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.9977
On the security of public key protocols, Information Theory, pp.198-208, 1983. ,
Efficient group authentication protocol based on human interaction, Proc. FCS-ARSPA, 2006. ,
Authenticating ad hoc networks by comparison of short digests, Information and Computation, vol.206, issue.2-4, 2008. ,
DOI : 10.1016/j.ic.2007.07.010
Secure Communications over Insecure Channels Based on Short Authenticated Strings, Advances in Cryptology -Crypto 2005, pp.309-326 ,
DOI : 10.1007/11535218_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.5120
Efficient Mutual Data Authentication Using Manually Authenticated Strings, Proc. Cryptology and Network Security, 2006. ,
DOI : 10.1007/11935070_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.2280
org/search?query=card 35 Usability and Security of Out-Of-Band Channels in Secure Device Pairing Protocols, Proc. SOUPS, 2009. ,
Don't use cards at petrol stations ,
Metro restaurant workers indicted in credit card scam ,
Man-in-the-Middle Attack to the HTTPS Protocol, IEEE Security & Privacy, 2009. ,
DOI : 10.1109/MSP.2009.12
Man-in-the-Middle in Tunnelled Authentication Protocols, Security Protocols Workshop, 2005. ,
???Man in the Middle??? Attacks on Bluetooth, Proc. Financial Cryptography, 2003. ,
DOI : 10.1007/978-3-540-45126-6_11
Open sesame: the magic car thieves. The Sunday Times, 6 Feb, 2011. ,