I. Iec, -Identification cards -Contactless integrated circuit cards - Proximity cards, Part 2: Radio frequency power and signal interface, 2010.

I. Iec, 14443-3:2011 -Identification cards -Contactless integrated circuit cards - Proximity cards, Part 3: Initialization and anticollision, 2011.

I. Iec, -Identification cards -Contactless integrated circuit cards - Proximity cards, Part 4: Transmission protocol, 2008.

I. Iec, 7816-3:2006 -Identification cards -Integrated circuit cards, Part 3: Cards with contacts -Electrical interface and transmission protocols, 2006.

I. Iec, 7816-4:2013 -Identification cards -Integrated circuit cards, Part 4: Organization, security and commands for interchange, 2013.

M. Bond, O. Choudary, S. J. Murdoch, S. P. Skorobogatov, and R. J. Anderson, Chip and Skim: Cloning EMV Cards with the Pre-play Attack, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.11

URL : http://www.cl.cam.ac.uk/~osc22/docs/preplay_oakland14.pdf

J. Van, NFC Hacking: The Easy Way, DEF CON, vol.2012, 2012.

J. Van, Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices, 2015.

T. Chothia, F. D. Garcia, J. De-ruiter, J. Van-den-breekel, and M. Thompson, Relay Cost Bounding for Contactless EMV Payments, 19th International Conference on Financial Cryptography and Data Security, 2015.
DOI : 10.1007/978-3-662-47854-7_11

URL : https://www.cs.bham.ac.uk/%7Egarciaf/publications/Relay_Cost_Bounding_for_Contactless_EMV_Payments.pdf

X. Chu, Relay attacks of NFC smart cards, 2014.

L. Francis, G. Hancke, K. Mayes, and K. , Markantonakis: Practical NFC Peer-to-peer Relay Attack Using Mobile Phones, 6th International Conference on Radio Frequency Identification: Security and Privacy Issues. RFIDSec'10, 2010.
DOI : 10.1007/978-3-642-16822-2_4

URL : http://www.yodo.co/uploads/1/0/8/8/10888354/hanckemulliner.pdf

G. P. Hancke, K. E. Mayes, and K. , Markantonakis: Confidence in Smart Token Proximity: Relay Attacks Revisited, Computers & Security, vol.28, issue.7, 2009.
DOI : 10.1016/j.cose.2009.06.001

G. Hancke, A Practical Relay Attack on ISO 14443 Proximity Cards, 2005.

G. Hancke and M. Kuhn, An RFID Distance Bounding Protocol, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005.
DOI : 10.1109/SECURECOMM.2005.56

Z. Kfir and A. , Wool: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005.
DOI : 10.1109/securecomm.2005.32

C. Killer, NFCProxy Relay Attack in the Wild. https://www.youtube.com/watch? v=fRtn4ZfkLkM, [online, 2016.

C. Killer, Security Challenges in Contactless Payments Solutions. Assignment, Communication Systems Group, 2015.

S. Murdoch, S. Drimer, R. Anderson, and M. Bond, Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.33

S. J. Murdoch and R. Anderson, Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication, 14th International Conference on Financial Cryptography and Data Security, 2010.
DOI : 10.1007/978-3-642-14577-3_27

URL : http://www.cl.cam.ac.uk/~sjm217/papers/fc10vbvsecurecode.pdf

M. Ngu and C. Scott, How Secure are Contactless Payment Systems, RSA Conference, 2015.

M. Roland and J. Langer, Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless, 7th USENIX Conference on Offensive Technologies, 2013.

J. Vila and R. J. Rodriguez, Practical Experiences on NFC Relay Attacks with Android -Virtual Pickpocketing Revisited, 11th Workshop on RFID Security, 2015.
DOI : 10.1007/978-3-319-24837-0_6

M. Weiß, Performing Relay Attacks on ISO 14443 Contactless Smart Cards using NFC Mobile Equipment, 2010.