I. Report, ITU sees 5 billion mobile subscriptions globally in 2010

L. Srivastava, Japan's ubiquitous mobile information society, info, vol.6, issue.4, 2004.
DOI : 10.1108/14636690110422258

. Reuters, Dutch deal paves way for mobile payments in 2012

C. Finextra and . Telecom, Bank of China and China UnionPay launch mobile proximity payments

M. Pasquet, J. Reynaud, and C. Rosenberger, Secure payment with NFC mobile phone in the SmartTouch project, 2008 International Symposium on Collaborative Technologies and Systems, 2008.
DOI : 10.1109/CTS.2008.4543921

K. S. Kadambi, J. Li, and A. H. Karp, Near-field communication-based secure mobile payment service, Proceedings of the 11th International Conference on Electronic Commerce, ICEC '09, 2009.
DOI : 10.1145/1593254.1593276

L. Francis, G. P. Hancke, K. E. Mayes, and K. Markantonakis, Practical NFC Peerto-Peer Relay Attack using Mobile Phones, Workshop on RFID Security, 2010.
DOI : 10.1007/978-3-642-16822-2_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.1413

E. Haselsteiner and K. Breitfuss, Security in Near Field Communication, Proc. Workshop on RFID Security, 2006.

J. J. Chen and C. Adams, Short-range wireless technologies with mobile payments systems, Proceedings of the 6th international conference on Electronic commerce , ICEC '04, 2004.
DOI : 10.1145/1052220.1052302

S. Pradhan, E. Lawrence, and A. Zmijewska, Bluetooth as an enabling technology in mobile transactions, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, 2005.
DOI : 10.1109/ITCC.2005.98

K. Zolfaghar and S. Mohammadi, Securing Bluetooth-based payment system using honeypot, 2009 International Conference on Innovations in Information Technology (IIT), 2009.
DOI : 10.1109/IIT.2009.5413764

J. Gao, K. Edunuru, J. Cai, and S. Shim, P2P-Paid: A Peer-to-Peer Wireless Payment System, Second IEEE International Workshop on Mobile Commerce and Services
DOI : 10.1109/WMCS.2005.16

M. Jakobsson and S. Wetzel, Security Weaknesses in Bluetooth, Proc. CT-RSA 2001, pp.176-191, 2001.
DOI : 10.1007/3-540-45353-9_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7357

N. Mallat, Exploring consumer adoption of mobile payments ??? A qualitative study, The Journal of Strategic Information Systems, vol.16, issue.4, pp.413-432, 2007.
DOI : 10.1016/j.jsis.2007.08.001

M. Mannan and P. C. Van-oorschot, Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Proc. Financial Cryptography and Data Security, 2008.
DOI : 10.1007/978-3-540-77366-5_11

C. Mune, R. Gassira, and R. Piccirillo, Hijacking Mobile Data Connec- tions. http://www.blackhat.com/presentations/bh-europe-09, Europe-2009-Gassira-Piccirillo-Hijacking-Mobile- Data-Connections-whitepaper.pdf

G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, NFC Devices: Security and Privacy, 2008 Third International Conference on Availability, Reliability and Security, 2008.
DOI : 10.1109/ARES.2008.105

A. Gotstev and D. Maslennikov, Mobile Malware Evolution: An Overview, Part 3, 204792080.

G. Lawton, Is It Finally Time to Worry about Mobile Malware?, Computer, vol.41, issue.5, pp.12-14, 2008.
DOI : 10.1109/MC.2008.159

C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes, Can you infect me now?, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07
DOI : 10.1145/1314389.1314402

R. Sanders, From EMV to NFC: the contactless trail?, Card Technology Today, vol.20, issue.3, 2008.
DOI : 10.1016/S0965-2590(08)70077-X

B. Adida, M. Bond, J. Clulow, A. Lin, S. Murdoch et al., Phish and Chips, Security Protocols Workshop, 2006.
DOI : 10.1007/978-3-642-04904-0_7

Z. S21sec and . Mitmo, Man-in-the-mobile. http://securityblog.s21sec.com/ 2010/09/zeus-mitmo-man-in-mobile-i.html 27. RSA Lab Making Sense of Man-in-the-browser Attacks

L. H. Nguyen and A. W. Roscoe, Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey, Journal of Computer Security, vol.19, issue.1, 2010.
DOI : 10.3233/JCS-2010-0403

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.9977

D. Dolev and A. Yao, On the security of public key protocols, Information Theory, pp.198-208, 1983.

L. H. Nguyen and A. W. Roscoe, Efficient group authentication protocol based on human interaction, Proc. FCS-ARSPA, 2006.

L. H. Nguyen and A. W. Roscoe, Authenticating ad hoc networks by comparison of short digests, Information and Computation, vol.206, issue.2-4, 2008.
DOI : 10.1016/j.ic.2007.07.010

S. Vaudenay, Secure Communications over Insecure Channels Based on Short Authenticated Strings, Advances in Cryptology -Crypto 2005, pp.309-326
DOI : 10.1007/11535218_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.5120

S. Laur and K. Nyberg, Efficient Mutual Data Authentication Using Manually Authenticated Strings, Proc. Cryptology and Network Security, 2006.
DOI : 10.1007/11935070_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.2280

R. Dataloss, I. Kainda, A. W. Flechais, and . Roscoe, org/search?query=card 35 Usability and Security of Out-Of-Band Channels in Secure Device Pairing Protocols, Proc. SOUPS, 2009.

T. Online, Don't use cards at petrol stations

. Startribune, Metro restaurant workers indicted in credit card scam

F. Callegati, W. Cerroni, and M. Ramilli, Man-in-the-Middle Attack to the HTTPS Protocol, IEEE Security & Privacy, 2009.
DOI : 10.1109/MSP.2009.12

N. Asokan, V. Niemi, and K. Nyberg, Man-in-the-Middle in Tunnelled Authentication Protocols, Security Protocols Workshop, 2005.

D. Kugler, ???Man in the Middle??? Attacks on Bluetooth, Proc. Financial Cryptography, 2003.
DOI : 10.1007/978-3-540-45126-6_11

D. Tobin, Open sesame: the magic car thieves. The Sunday Times, 6 Feb, 2011.