References
- "Google Wallet: Security", Google, 2011
- "MasterCard PayPass", MasterCard, 2011
- J. Hoffstein, J. Pipher, J. H. Silverman, "NTRU : A Ring Based Public Key Cryptosystem", in Algorithmic Number Theory(ANTS III), 1998.
- S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208. https://doi.org/10.1137/0218012
- R.L. Rivest, A. Shamir, Y. Tauman, "How to Leak a Secret", Advances in Cryptology-ASIACRYPT, 2001.
- "A Study on the Development of Cryptosystems for the Next Generation", National Security Research Institute, 2006
- S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208. https://doi.org/10.1137/0218012
- A.Shamir, "ID-Based Cryptosystems and Signature Schemes", Crypto'84, pp.47-53, 1985.
- A.Fiat and A.Shamir, "How to Prove Yourself: Practical Solution to Identification and Signature Problem", Crypto'86, Vol 263, pp.186-194, 1986
- L.C.Guillou and J.J.Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge", Crypto'88, p.216-231, 1988
- C.P.Schnorr, "Efficient Signature Generation by Smart Card", Journal of Cryptology, pp.161-174, 1991.4
- S.H Lim, J.W Jeon, J.I Jin, O.Y Lee, "Study on NFC Security Analysis and UICC Alternative Effect", Korea Information and Communications Society, 2011 https://doi.org/10.7840/KICS.2011.36B.1.29
- Ernst Haselsteiner, Klemens Breitfuss, "Security in near field communication(NFC)", Workshop on RFID Security RFIDSec, 2006
Cited by
- A New Self-Certified Signature Scheme Based on NTRUSing for Smart Mobile Communications vol.96, pp.3, 2017, https://doi.org/10.1007/s11277-017-4385-y
- Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC vol.7, pp.2, 2015, https://doi.org/10.3390/sym7020935
- Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography vol.2015, 2015, https://doi.org/10.1155/2015/807213
- Improving the Authentication Scheme and Access Control Protocol for VANETs vol.16, pp.11, 2014, https://doi.org/10.3390/e16116152
- An Efficient Algorithm for Maximizing Range Sum Queries in a Road Network vol.2014, 2014, https://doi.org/10.1155/2014/541602
- A prediction and auto-execution system of smartphone application services based on user context-awareness vol.60, pp.8, 2014, https://doi.org/10.1016/j.sysarc.2014.04.001
- A Study on Electronic-Money Technology Using Near Field Communication vol.7, pp.1, 2014, https://doi.org/10.3390/sym7010001
- A Study on High Secure and Efficient MANET Routing Scheme vol.2015, 2015, https://doi.org/10.1155/2015/365863
- Time evolution of face recognition in accessible scenarios vol.5, pp.1, 2015, https://doi.org/10.1186/s13673-015-0043-0
- Privacy-Enhancing Security Protocol in LTE Initial Attack vol.6, pp.4, 2014, https://doi.org/10.3390/sym6041011
- Mobile payment in Fintech environment: trends, security challenges, and services vol.8, pp.1, 2018, https://doi.org/10.1186/s13673-018-0155-4