G. Madlmayr, J. Langer, and J. Scharinger, Managing an NFC Ecosystem, 2008 7th International Conference on Mobile Business, pp.95-101, 2008.
DOI : 10.1109/ICMB.2008.30

G. Van-damme, K. Wouters, H. Karahan, and B. Preneel, Offline NFC payments with electronic vouchers, Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, MobiHeld '09, 2009.
DOI : 10.1145/1592606.1592613

A. Juntunen, S. Luukkainen, and V. K. Tuunainen, Deploying NFC Technology for Mobile Ticketing Services Identification of Critical Business Model Issues, Mobile Business and 2010 Ninth Global Mobility Roundtable, Ninth International Conference on, pp.82-90, 2010.

R. Peeters, D. Singele, and B. Preneel, Threshold-Based Location-Aware Access Control, International Journal of Handheld Computing Research, vol.2, issue.17, 2011.
DOI : 10.4018/jhcr.2011070102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.656.2699

G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, NFC Devices: Security and Privacy, Availability, Reliability and Security, ARES 08. Third International Conference on, pp.642-647, 2008.
DOI : 10.1109/ares.2008.105

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

E. International and . Nfc-sec, NFCIP-1 Security Services and Protocol Cryptography Standard using ECDH and AES (white paper) Online: http:// www.ecma-international, pp.47-2008, 2008.

M. Manninger, Smart Card Technology Wireless Security and Cryptography -Specifications and Implementations, p.364, 2007.

¨. Ors, S. B. Preneel, B. Verbauwhede, and I. , Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms, Wireless Security and Cryptography -Specifications and Implementations, pp.213-247, 2007.

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, 1996.
DOI : 10.1007/3-540-68697-5_9

D. Mulder, E. Ors, S. B. Preneel, B. Verbauwhede, and I. , Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems, Computers & Electrical Engineering, vol.33, issue.5-6, pp.5-6, 2007.
DOI : 10.1016/j.compeleceng.2007.05.009

X. Inc, Online: http://www.xilinx.com/ise/embedded, 2006.

W. Stallings, Transport Layer Security, In: Cryptography and Network Security - Principles and Practice, p.16, 2003.