References
- International Organization for Standardization, ISO/IEC 18092: Information Technology-Telecommunication and Information Exchange between Systems-Near Field Communication-Interface and Protocol, 2004.
- V. Coskun, K. Ok, and B. Ozdenizci, Near Field Communication: from Theory to Practice, John Wiley and Sons, United Kingdom, 2012.
- V. Coskun, B. Ozdenizci, and K. Ok, "A Survey on Near Field Communication Technology," Wireless Personal Communications, Vol. 71, No. 3, pp. 2259-2294, 2013. https://doi.org/10.1007/s11277-012-0935-5
- H.M. Kang, H.S. Choi, and K.A. Cha, "Development of Vehicle Status Alerts System for Personal Information Leakage Protection using the NFC-based GCM Service," Journal of Korea Multimedia Society, Vol. 19, No. 2, pp. 317-324, 2016. https://doi.org/10.9717/kmms.2016.19.2.317
- E. Haselsteiner and K. Breitfuss, "Security in Near Field Communication," Proceeding of Workshop on RFID and Lightweight Crypto, pp. 3-13, 2006.
- ECMA International, NFC-SEC: NFCIP-1 Security Services and Protocol, 2010.
- ECMA International, NFC-SEC-01: NFCSEC Cryptography Standard Using ECDHand AES, 2010.
- Juniper Research, Mobile Coupons-Ecosystem Analysis and Marketing Channel Strategy 2011-2016, Juniper Research, Technical Report, 2011.
- M. Aigner, S. Dominikus, and M. Feldhofer, "A System of Secure Virtual Coupons Using NFC Technology," Proceeding of Pervasive Computing and Communications Workshops, pp. 362-366, 2007.
- S. Domonikus and M. Aigner, "mCoupons: An Application for Near Field Communication (NFC)," Proceeding of Advanced Information Networking and Applications Workshops, pp. 421-428, 2007.
- A. Alshehri and S. Schneider, "Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol," Proceeding of Smart Card Researchg and Advanced Application Conference, Lecture Notes in Computer Science, pp. 152-167, 2014.
- H. Hsiang and W. Shih, "Secure m-Coupon Scheme Using NFC," Proceeding of International Conference on Business and Information, pp. 3901-3909, 2008.
- H. Hsiang, H. Kuo, and W. Shih, "Secure m-Coupon Scheme Using Near Field Communication," International Journal of Innovative Computing, Information and Control, Vol. 5, No. 11, pp. 3901-3909, 2009.
- S.W. Park and I.Y. Lee, "A Study on Light- Weight Signature Scheme for NFC mCoupon Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 24, No. 2, pp. 275-284, 2014. https://doi.org/10.13089/JKIISC.2014.24.2.275
- S.W. Park and I.Y. Lee, "Efficient mCoupon Authentication Scheme for Smart Poster Environments Based on Low-Cost NFC," International Journal of Security and Its Applications, Vol. 7, No. 5, pp. 131-138, 2013. https://doi.org/10.14257/ijsia.2013.7.5.11
- J.C. Ha, "Security Analysis on NFC- Based M-Coupon Protocols and Its Countermeasure," Journal of Korea Academia-Industrial Cooperation Society, Vol. 16, No. 2, pp. 1388-1397, 2015. https://doi.org/10.5762/KAIS.2015.16.2.1388
- A. Alshehri and S. Schneider, "A Formal Framework for Security Analysis of NFC Mobile Coupon Protocols," Journal of Computer Security, Vol. 23, No. 6, pp. 608-707, 2015.
- L. Reyzin and N. Reyzin, "Better than Biba: Short One Time Signatures with Fast Signing and Verifying," Information Security and Privacy, Lecture Notes in Computer Science, Vol. 2384, pp. 144-154, 2002.
- G. Lowe, "Casper: A Compier for the Analysis of Security Protocols," Journal of Computer Security, Vol. 6, No. 1, pp. 53-84, 1998. https://doi.org/10.3233/JCS-1998-61-204