A survey on near field communication (NFC) technology

V Coskun, B Ozdenizci, K Ok - Wireless personal communications, 2013 - Springer
Abstract Near Field Communication (NFC) as a promising short range wireless
communication technology facilitates mobile phone usage of billions of people throughout …

Systematic survey of mobile payments, protocols, and security infrastructure

S Bojjagani, VN Sastry, CM Chen, S Kumari… - Journal of Ambient …, 2023 - Springer
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shop** …

Limitations to the rapid adoption of M-payment services: Understanding the impact of privacy risk on M-Payment services

VL Johnson, A Kiser, R Washington, R Torres - Computers in Human …, 2018 - Elsevier
M-payment services offer many advantages over traditional payment services and analysts
have predicted their explosive growth for years. However, despite touted advantages …

Smart locks: Lessons for securing commodity internet of things devices

G Ho, D Leung, P Mishra, A Hosseini, D Song… - Proceedings of the 11th …, 2016 - dl.acm.org
We examine the security of home smart locks: cyber-physical devices that replace traditional
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …

Consumers' willingness to adopt and use WeChat wallet: An empirical study in South Africa

ED Matemba, G Li - Technology in Society, 2018 - Elsevier
For decades, the technology acceptance model (TAM) has been validated by studies to
discern its predictive power. However, scholars have noted that the assumptions in TAM can …

NFC tags with proximity detection

IJ Forster - US Patent 9,767,329, 2017 - Google Patents
Systems, apparatuses and methods provide for detecting the proximate placement of an
external NFC reader to a specific location on a display surface. The display surface can be …

[PDF][PDF] EMV in a nutshell

J Van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter - 2016 - cs.ru.nl
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …

Practical relay attack on contactless transactions by using NFC mobile phones

L Francis, G Hancke, K Mayes… - Radio Frequency …, 2012 - ebooks.iospress.nl
Contactless technology is widely used in security sensitive applications, including
identification, payment and access-control systems. Near Field Communication (NFC) is a …

Security of distance-bounding: A survey

G Avoine, MA Bingöl, I Boureanu, S Čapkun… - ACM Computing …, 2018 - dl.acm.org
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …

Cyber-physical system security of vehicle charging stations

R Gottumukkala, R Merchant, A Tauzin… - 2019 IEEE Green …, 2019 - ieeexplore.ieee.org
Electric Vehicle Supply Equipment (EVSE), also known as charging stations, are available
for charging electric vehicles. EVSE contain computers that are connected to the Internet …