A hybrid NFC-Bluetooth secure protocol for Credit Transfer among mobile phones
暂无分享,去创建一个
Joel J. P. C. Rodrigues | Jaime Lloret | Sandra Sendra | David M. Monteiro | Jaime Lloret | J. Rodrigues | S. Sendra | D. M. Monteiro
[1] Tasnuva Ali,et al. Security in Near Field Communication for m-payment service , 2015 .
[2] T. Mackey. Format , 2005 .
[3] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[4] Yves Pigneur,et al. Cross-industry Preferences for Development of Mobile Payments in Switzerland , 2007, Electron. Mark..
[5] Josef Langer,et al. Security Vulnerabilities of the NDEF Signature Record Type , 2011, 2011 Third International Workshop on Near Field Communication.
[6] Tuomo Tuikka,et al. Location-Based Mobile Wiki Using NFC Tag Infrastructure , 2009, 2009 First International Workshop on Near Field Communication.
[7] Chu Zhang,et al. Mobile Payment based on RFID-SIM Card , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[8] Yves Pigneur,et al. Near field communication: an assessment for future payment systems , 2009, Inf. Syst. E Bus. Manag..
[9] Antonio J. Jara,et al. Secure use of NFC in medical environments , 2009 .
[10] H. Risken. Fokker-Planck Equation , 1996 .
[11] Shah Nawaz Khan,et al. Self-Organized Disjoint Service Placement in Future Mobile Communication Networks , 2012, Int. J. Commun. Networks Inf. Secur..
[12] Zvisinei Sandi. DEFINITION , 1961, A Philosopher Looks at Sport.
[13] K. Hypponen,et al. Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[14] J. Elgin. The Fokker-Planck Equation: Methods of Solution and Applications , 1984 .
[15] J.-H. Chiu,et al. NFC Mobile Transactions and Authentication Based on GSM Network , 2010, 2010 Second International Workshop on Near Field Communication.
[16] Richard C. Bradley,et al. On the growth of variances in a central limit theorem for strongly mixing sequences , 1999 .
[17] James G. Anderson,et al. Social, ethical and legal barriers to E-health , 2007, Int. J. Medical Informatics.
[18] David R. Cox,et al. The Theory of Stochastic Processes , 1967, The Mathematical Gazette.
[19] J. Gao,et al. P2P-Paid: A Peer-to-Peer Wireless Payment System , 2005, Second IEEE International Workshop on Mobile Commerce and Services.
[20] Robert J. Kauffman,et al. The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application , 2008, Electron. Commer. Res. Appl..
[21] Sandra Dominikus,et al. mCoupons: An Application for Near Field Communication (NFC) , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[22] K.K. Tan,et al. Near Field Communication and Bluetooth Bridge System for Mobile Commerce , 2006, 2006 4th IEEE International Conference on Industrial Informatics.
[23] Eiman Kanjo. Tools and Architectural support for Mobile Phones based Crowd Control Systems , 2012, Netw. Protoc. Algorithms.
[24] Wei Liu,et al. The GPRS Mobile Payment System Based on RFID , 2006, 2006 International Conference on Communication Technology.
[25] Tadeusz Czachórski,et al. Diffusion approximation as a modelling tool in congestion control and performance evaluation , 2003 .
[26] Kefei Chen,et al. Electronic Payment in Mobile Environment , 2002, DEXA Workshops.
[27] Jaime Lloret,et al. A secure NFC application for credit transfer among mobile phones , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[28] G. Schreier,et al. Near Field Communication Technology as the Key for Data Acquisition in Clinical Research , 2009, 2009 First International Workshop on Near Field Communication.
[29] J. Parkka,et al. Application of Near Field Communication for Health Monitoring in Daily Life , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[30] Kiyana Zolfaghar,et al. Securing Bluetooth-based payment system using honeypot , 2009, 2009 International Conference on Innovations in Information Technology (IIT).
[31] H. D. Miller,et al. The Theory Of Stochastic Processes , 1977, The Mathematical Gazette.
[32] Rainer Steffen,et al. Near Field Communication (NFC) in an Automotive Environment , 2010, 2010 Second International Workshop on Near Field Communication.
[33] Jorma Ylinen,et al. Near Field Communication Network Services , 2009, 2009 Third International Conference on Digital Society.
[34] Toni Janevski,et al. Protocols and Algorithms for the Next Generation 5G Mobile Systems , 2011, Netw. Protoc. Algorithms.
[35] Gerald Madlmayr,et al. Near Field Communication based Mobile Payment System , 2008 .
[36] Henning Siitonen Kortvedt,et al. Eavesdropping Near Field Communicat ion , 2009 .