Managing an NFC Ecosystem, 2008 7th International Conference on Mobile Business, pp.95-101, 2008. ,
DOI : 10.1109/ICMB.2008.30
Offline NFC payments with electronic vouchers, Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, MobiHeld '09, 2009. ,
DOI : 10.1145/1592606.1592613
Deploying NFC Technology for Mobile Ticketing Services Identification of Critical Business Model Issues, Mobile Business and 2010 Ninth Global Mobility Roundtable, Ninth International Conference on, pp.82-90, 2010. ,
Threshold-Based Location-Aware Access Control, International Journal of Handheld Computing Research, vol.2, issue.17, 2011. ,
DOI : 10.4018/jhcr.2011070102
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.656.2699
NFC Devices: Security and Privacy, Availability, Reliability and Security, ARES 08. Third International Conference on, pp.642-647, 2008. ,
DOI : 10.1109/ares.2008.105
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
NFCIP-1 Security Services and Protocol Cryptography Standard using ECDH and AES (white paper) Online: http:// www.ecma-international, pp.47-2008, 2008. ,
Smart Card Technology Wireless Security and Cryptography -Specifications and Implementations, p.364, 2007. ,
Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms, Wireless Security and Cryptography -Specifications and Implementations, pp.213-247, 2007. ,
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems, pp.292-302, 1999. ,
DOI : 10.1007/3-540-48059-5_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems, Computers & Electrical Engineering, vol.33, issue.5-6, pp.5-6, 2007. ,
DOI : 10.1016/j.compeleceng.2007.05.009
Online: http://www.xilinx.com/ise/embedded, 2006. ,
Transport Layer Security, In: Cryptography and Network Security - Principles and Practice, p.16, 2003. ,