-Identification cards -Contactless integrated circuit cards - Proximity cards, Part 2: Radio frequency power and signal interface, 2010. ,
14443-3:2011 -Identification cards -Contactless integrated circuit cards - Proximity cards, Part 3: Initialization and anticollision, 2011. ,
-Identification cards -Contactless integrated circuit cards - Proximity cards, Part 4: Transmission protocol, 2008. ,
7816-3:2006 -Identification cards -Integrated circuit cards, Part 3: Cards with contacts -Electrical interface and transmission protocols, 2006. ,
7816-4:2013 -Identification cards -Integrated circuit cards, Part 4: Organization, security and commands for interchange, 2013. ,
Chip and Skim: Cloning EMV Cards with the Pre-play Attack, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.11
URL : http://www.cl.cam.ac.uk/~osc22/docs/preplay_oakland14.pdf
NFC Hacking: The Easy Way, DEF CON, vol.2012, 2012. ,
Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices, 2015. ,
Relay Cost Bounding for Contactless EMV Payments, 19th International Conference on Financial Cryptography and Data Security, 2015. ,
DOI : 10.1007/978-3-662-47854-7_11
URL : https://www.cs.bham.ac.uk/%7Egarciaf/publications/Relay_Cost_Bounding_for_Contactless_EMV_Payments.pdf
Relay attacks of NFC smart cards, 2014. ,
Markantonakis: Practical NFC Peer-to-peer Relay Attack Using Mobile Phones, 6th International Conference on Radio Frequency Identification: Security and Privacy Issues. RFIDSec'10, 2010. ,
DOI : 10.1007/978-3-642-16822-2_4
URL : http://www.yodo.co/uploads/1/0/8/8/10888354/hanckemulliner.pdf
Markantonakis: Confidence in Smart Token Proximity: Relay Attacks Revisited, Computers & Security, vol.28, issue.7, 2009. ,
DOI : 10.1016/j.cose.2009.06.001
A Practical Relay Attack on ISO 14443 Proximity Cards, 2005. ,
An RFID Distance Bounding Protocol, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005. ,
DOI : 10.1109/SECURECOMM.2005.56
Wool: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. ,
DOI : 10.1109/securecomm.2005.32
NFCProxy Relay Attack in the Wild. https://www.youtube.com/watch? v=fRtn4ZfkLkM, [online, 2016. ,
Security Challenges in Contactless Payments Solutions. Assignment, Communication Systems Group, 2015. ,
Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.33
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication, 14th International Conference on Financial Cryptography and Data Security, 2010. ,
DOI : 10.1007/978-3-642-14577-3_27
URL : http://www.cl.cam.ac.uk/~sjm217/papers/fc10vbvsecurecode.pdf
How Secure are Contactless Payment Systems, RSA Conference, 2015. ,
Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless, 7th USENIX Conference on Offensive Technologies, 2013. ,
Practical Experiences on NFC Relay Attacks with Android -Virtual Pickpocketing Revisited, 11th Workshop on RFID Security, 2015. ,
DOI : 10.1007/978-3-319-24837-0_6
Performing Relay Attacks on ISO 14443 Contactless Smart Cards using NFC Mobile Equipment, 2010. ,