References
- Al Alkeem, E., Yeun, C.Y., Baek, J.S.: Secure NFC Authentication Protocol Based on LTE Network. Lecture Notes in Electrical Engineering, Springer, vol. 280, pp. 363-371. (2014)
- Lo, N.W, Yeh, K.H., Yeun, C.Y.: New Mutual Agreement Protocol to Secure Mobile RFID-Enabled Devices. Information Security Technical Report, Elsevier, vol. 13, 3, pp. 151-157, (2008). https://doi.org/10.1016/j.istr.2008.09.002
- Chen, W.D., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.H.: Using 3G Network Components to Enable NFC Mobile Transactions and Authentication. Progress in Informatics and Computing (2010)
- Massoth, M., Bingel, T.: "Performance of Different Mobile Payment Service Concepts Compared with a NFC-Based Solution," iciw, 2009 Fourth International Conference on Internet and Web Applications and Services, pp. 205-210. (2009)
- ISO/IEC 18092 (ECMA-340): Information technology - Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1).
- ISO/IEC 14443: Identification cards - Contactless integrated circuit cards- Proximity cards.
- NFC Forum: White paper on 'smart posters. Tech. Rep. (2011)
- NFC Forum: White paper on essentials for successful NFC mobile ecosystem. Tech. Rep., (2008)
- NFC Forum: White paper on 'the keys to truly interoperable communications. Tech. Rep., (2007)
- Han, C.K., Choi, H.K, Baek, J.W.: Evaluation of Authentication Signaling Loads in 3GPP LTE/SAE Networks. IEEE 34th Conference on Local Computer Networks. pp. 37-44. (2009)
- 3GPP. TS 36.331 V9.1.0, 3rd Generation Partnership Project: Technical Specificaion Group Radio Access Netword; Evolved Universal Terrestrial Radio Access (E-UTRA), Radio Resource Control (RRC) Protocol Specification
- 3GPP. TS 33.102 V9.2.0, 3rd Generation Partnership Project: Technical Specification Group Services and System Aspects; 3G Security ; Security architecture protocol specification
- 3GPP. TS 24.301 V9.3.0, 3 rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non Access Stratum (NAS) protocol for Evolved Packet System (EPS): Stage 3 protocol Specification.
- Communications Fraud Control Association (CFCA): www.cfca.org
- Dastani, M., van Riemsdijk, M.B., Dignum, F., Meyer, J.C.: A programming language for cognitive agents: goal directed 3APL. Programming multiagent systems, first international workshop (Pro-MAS' 03), vol.3067 of LNCS, Berlin, 2004, pp. 111-130. (2004)
- Bordini, R.H., Hubner, J.F.: BDI agent programming in AgentSpeak using jason (tutorial paper). In Computational Logic in Multi-Agent Systems VI (CLIMA), vol. 3900 of Lecture Notes in Artificial Intelligence, Heidelberg, Germany, pp. 143-164. (2006)
- Rinard, M.C., Scales, D.J., Lam, M.S.: Jade: a high-level, machine-independent language for parallel programming. IEEE Computer Society, vol. 26, 6, pp. 28 -38. (1993)
- Zhang, Z., Zhang, X., Sandhu, R.; ROBAC: Scalable Role and Organization Based Access Control Models. International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1-9. (2006).
- Abadi, M., Fournet, C.; Mobile Values, New Names, and Secure Communication. Proc. of the 28th ACM Symposium on Principles of Programming Languages (POPL' 01), pp.104--115. (2001)
- Blanchet, B, Chaudhuri, A.: Automated Formal Analysis of a Protocol forSecure File Sharing on Untrusted Storage. IEEE Symposium on Security and Privacy, pp. 417-431. (2008)
- Blanchet, B, Smyth, B.: ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial: http://www.proverif.ens.fr/manual.pdf, (2011)
- Yeun, C.Y., Farnham, T., "Secure m-commerce with WPKI," In proceedings of 1st International Workshop for Asian PKI, October 2001. (This is a reference for e-payment)
- Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E., Hu, J., "BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications," Security and Communication Networks, Vol. 2017, 3606424, 2017. (This is a reference for e-payment
- Lo, N.W., Yeh, K.H., Yeun, C.Y., "New mutual agreement protocol to secure mobile RFID-enabled devices," Information Security Technical Report, Vol. 13, No. 3, pp. 151-157, 2008. (This is a reference for RFID/IoT/NFC) https://doi.org/10.1016/j.istr.2008.09.002
- Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K., "A novel hybrid cellular automata based cipher system for internet of things," In Future information technology, Springer, pp. 269-276, 2014. (This is a reference for RFID/IoT/NFC)
- Al Alkeem, E., Yeun, C.Y., Zemerly, M.J., "Security and privacy framework for ubiquitous healthcare IoT devices" In proceeding of 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 70-75, December 2015. (This is a reference for RFID/IoT/NFC)
- Al Alkeem, E., Shehada, D., Yeun, C.Y., Zemerly, M.J., Hu, J., "New secure healthcare system using cloud of things," Cluster Computing, Vol. 2, No. 3, pp. 2211-2229, 2017. (This is a reference for RFID/IoT/NFC)