참고문헌
- International Organization for Standardization (ISO), "ISO/IEC 18092: Information Technology -telecommunication and information exchange between systems -Near Field Communication- interface and protocol(NFCIP-1)," 2004.
- ECMA, "Near Field Communication Interface and Protocol (NFCIP-1)- 2nd Edition ECMA-340," 2004.
- A. Kusuma, "Real World Applications of Near Field Communication," Interactive Multimedia Conference (IMC'12), 2012. Available From: http://mms.ecs.soton.ac.uk/2012/
- E. Haselsteiner and K. Breitfuss, "Security in near field communication (NFC)," Workshop on RFID and Lightweight Crypto (RFIDSec'06), pp. 3-13, 2006.
- M. Aigner, S. Dominikus, and M. Feldhofer, "A system of secure virtual coupons using NFC technology," Pervasive Computing and Communications Workshops (PerComW'07), pp. 362 - 366, 2007.
- S. Domonikus and M. Aigner, "mCoupons: An application for near field communication (NFC)," Advanced Information Networking and Applications Workshops (AINAW'07), pp. 421-428, 2007.
- H. Hsiang H. Kuo, and W. Shih, "Secure mcoupons scheme using NFC," International Journal of Innovative Computing, Information and Control, vol. 5, no. 11, pp. 3901-3909, 2009.
- A. Alshehri, and S. Schneider, "Formal security analysis of NFC M-coupon protocols using Casper/ FDR," International Workshop on Near Field Communication (NFC'13), pp. 1-6, 2013.
- A. Alshehri, and S. Schneider, "Formally defining NFC M-coupon requirements, with a case study," International Conference for Internet Technology and Secured Transactions (ICITST'13), pp. 52-58, 2013. DOI: http://dx.doi.org/10.1109/ICITST.2013.6750161
- A. Alshehri, and S. Schneider, "Formal security analysis and improvement of a hash-based NFC M-coupon protocol," CARDIS'13, LNCS 8419, pp. 152-167, 2014.
- National Institute of Standards and Technology, "Advanced Encryption Standards," NIST FIPS PUB 197, 2001.
- W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976. DOI: http://dx.doi.org/10.1109/TIT.1976.1055638
- M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID system using the AES algorithm," CHES'04, LNCS 3156, pp. 357-370, 2004.
- G. Hancke, "Practical eavesdropping and skimming attacks on high-frequency RFID tokens," Journal of Computer Security, vol. 19, no. 2, pp. 259-288, 2011. https://doi.org/10.3233/JCS-2010-0407
- L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, "Practical NFC peer-to-peer relay attack using mobile phones," Workshop on RFID and Lightweight Crypto (RFIDSec'10), pp. 35-49, 2010.
- R. Rivest and A. Shamir, "How to expose an eavesdropper," Communications of the ACM, vol. 27, no. 4, pp. 393-395, 1984. DOI: http://dx.doi.org/10.1145/358027.358053
- National Institute of Standard and Technology, "Digital Signature Standard : FIPS-PUB 186-3," 2009.
- D. Hong, J. Lee. D. Kim. D. Kwon, K. Ryu, and D. Lee, "LEA : A 128-bit block cipher for fast encryption on common processors," WISA'13, LNCS 8367, pp. 3-27, 2013.
- A. Bogdanov, L. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An Ultra-Lightweight Block Cipher," CHES 2007, LNCS 4727, pp. 450-66, 2007.