|
[1] Want, Roy. "An introduction to RFID technology." IEEE pervasive computing 5.1 (2006): 25-33. [2] Coskun, Vedat, Busra Ozdenizci, and Kerem Ok. "A survey on near field communication (NFC) technology." Wireless personal communications 71.3 (2013): 2259-2294. [3] Haller, Neil, et al. A one-time password system. No. RFC 2289. 1998. [4] Patauner, C., et al. "High speed RFID/NFC at the frequency of 13.56 MHz." EURASIP Workshop on RFID. 2007. [5] Roland, Michael. "Software card emulation in NFC-enabled mobile phones: great advantage or security nightmare." Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use. 2012. [6] Ok, Kerem, et al. "Current benefits and future directions of NFC services." Education and Management Technology (ICEMT), 2010 International Conference on. IEEE, 2010. [7] Want, Roy. "Near field communication." IEEE Pervasive Computing 10.3 (2011): 4-7. [8] Hameed, Sufian, Usman Murad Jamali, and Adnan Samad. "Integrity protection of ndef message with flexible and enhanced nfc signature records." Trustcom/BigDataSE/ISPA, 2015 IEEE. Vol. 1. IEEE, 2015. [9] Roland, Michael, and Josef Langer. "Digital signature records for the NFC data exchange format." Near Field Communication (NFC), 2010 Second International Workshop on. IEEE, 2010. [10] Chen, Cheng Hao, Iuon Chang Lin, and Chou Chen Yang. "NFC attacks analysis and survey." Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014. [11] Madlmayr, Gerald, et al. "NFC devices: Security and privacy." Availability, Reliability and Security, 2008. ARES 08. Third International Conference on. IEEE, 2008. [12] Garfinkel, Simon, and Beth Rosenberg. RFID: Applications, security, and privacy. Pearson Education India, 2006. [13] Rivest, Ronald. "RFC 1321: The MD5 message-digest algorithm, April 1992." Status: INFORMATIONAl (2014). [14] Kale, Archita, and Utkarsh Dhawan. "TOTP Based 2-Factor Authentication: Future of Security." Imperial Journal of Interdisciplinary Research 2.10 (2016). [15] Tolani, Rohit, A. Yeole, and S. Gavhane. "An HOTP Based Algorithm to Enhance Wi-Fi Security." International Journal of Advanced Research in Computer Science and Software Engineering (2013). [16] Saparkhojayev, Nurbek, et al. "NFC-enabled access control and management system." Web and Open Access to Learning (ICWOAL), 2014 International Conference on. IEEE, 2014. [17] Ceipidor, U. Biader, et al. "NFC: Integration between RFID and Mobile, state of the art and future developments." RFIDays (2008). [18] Pellegrini, Andrea, Valeria Bertacco, and Todd Austin. "Fault-based attack of RSA authentication." Proceedings of the conference on Design, automation and test in Europe. European Design and Automation Association, 2010. [19] Schaller, Robert R. "Moore's law: past, present and future." IEEE spectrum 34.6 (1997): 52-59. [20] Nordrum, A. "Quantum Computer Comes Closer to Cracking RSA Encryption." IEEE Spectrum (2016). [21] Huang, Chao-Hsi, and Shih-Chih Huang. "RFID systems integrated OTP security authentication design." Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific. IEEE, 2013. [22] Chang, Chuan-Yu, and Jyun-Jie Liao. "Combination of RFID and face recognition for access control system." Consumer Electronics-Taiwan (ICCE-TW), 2015 IEEE International Conference on. IEEE, 2015. [23] Pan, Xiang. "Research and implementation of Access Control System based on RFID and FNN-Face Recognition." Intelligent System Design and Engineering Application (ISDEA), 2012 Second International Conference on. IEEE, 2012. [24] Jing, Bing-Zhong, et al. "Anti-spoofing system for RFID access control combining with face recogntion." Machine Learning and Cybernetics (ICMLC), 2010 International Conference on. Vol. 2. IEEE, 2010. [25] Larchikov, Andrey, et al. "Combining RFID-based physical access control systems with digital signature systems to increase their security." Software, Telecommunications and Computer Networks (SoftCOM), 2014 22nd International Conference on. IEEE, 2014. [26] Teh, Peng-Loon, Huo-Chong Ling, and Soon-Nyean Cheong. "NFC smartphone based access control system using information hiding." Open Systems (ICOS), 2013 IEEE Conference on. IEEE, 2013. [27] Mohan, Madan, Vidyasagar Potdar, and Elizabeth Chang. "Recovering and restoring tampered RFID data using steganographic principles." Industrial Technology, 2006. ICIT 2006. IEEE International Conference on. IEEE, 2006.
|