C. Brandt, Hacking iButtons, pp.27-30, 2010.

C. Brandt and M. Kasper, Don???t Push It: Breaking iButton Security, Foundations and Practice of Security, pp.369-387, 2014.
DOI : 10.1007/978-3-319-05302-8_23

F. Garcia, G. De-koning-gans, R. Verdult, and M. Meriac, Dismantling iClass and iClass Elite, Computer Security -ESORICS 2012, pp.697-715978, 2012.
DOI : 10.1007/978-3-642-33167-1_40

URL : http://www.cs.ru.nl/%7Erverdult/Dismantling_iClass_and_iClass_Elite_Poster-USENIX_2012.pdf

J. Grand and G. I. Studio, Can you really trust hardware? Exploring security problems in hardware devices, 2005.

G. Hancke, A practical relay attack on ISO 14443 proximity cards, Tech. rep, 2005.

G. Hancke, Practical attacks on proximity identification systems, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.6-333, 2006.
DOI : 10.1109/SP.2006.30

W. Issovits and M. Hutter, Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks, 2011 IEEE International Conference on RFID-Technologies and Applications, pp.335-342, 2011.
DOI : 10.1109/RFID-TA.2011.6068658

G. De-koning-gans, J. H. Hoepman, and F. Garcia, A Practical Attack on the MIFARE Classic, Smart Card Research and Advanced Applications, pp.267-282, 2008.
DOI : 10.1007/11908739_11

M. Krumnikl, Unique (EM4001) RFID emulator, 2007.

M. Integrated-products and . Inc, Software methods to achieve robust 1-Wire communication in iButton applications, p.159, 2008.

A. Mitrokotsa, M. Rieback, and A. Tanenbaum, Classifying RFID attacks and defenses, Information Systems Frontiers, vol.7, issue.7, pp.491-505, 2010.
DOI : 10.1007/s10796-009-9210-z

D. Oswald and C. Paar, Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World, Cryptographic Hardware and Embedded Systems -CHES 2011, pp.207-222, 2011.
DOI : 10.1007/978-3-642-23951-9_14

N. Tools, Platform independent Near Field Communication (NFC) library. https, 2017.

R. Verdult, F. D. Garcia, and J. Balasch, Gone in 360 seconds: Hijacking with Hitag2, Proceedings of the 21st USENIX Conference on Security Symposium. pp. 37?37. Security'12, USENIX Association, 2012.

R. Verdult, G. De-koning-gans, and F. D. Garcia, A Toolbox for RFID Protocol Analysis, 2012 Fourth International EURASIP Workshop on RFID Technology, pp.27-34, 2012.
DOI : 10.1109/RFID.2012.19