A survey on near field communication (NFC) technology
Abstract Near Field Communication (NFC) as a promising short range wireless
communication technology facilitates mobile phone usage of billions of people throughout …
communication technology facilitates mobile phone usage of billions of people throughout …
Systematic survey of mobile payments, protocols, and security infrastructure
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shop** …
are widely used by smartphones for utility payments, bill payments, and online shop** …
Limitations to the rapid adoption of M-payment services: Understanding the impact of privacy risk on M-Payment services
M-payment services offer many advantages over traditional payment services and analysts
have predicted their explosive growth for years. However, despite touted advantages …
have predicted their explosive growth for years. However, despite touted advantages …
Smart locks: Lessons for securing commodity internet of things devices
We examine the security of home smart locks: cyber-physical devices that replace traditional
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …
Consumers' willingness to adopt and use WeChat wallet: An empirical study in South Africa
For decades, the technology acceptance model (TAM) has been validated by studies to
discern its predictive power. However, scholars have noted that the assumptions in TAM can …
discern its predictive power. However, scholars have noted that the assumptions in TAM can …
NFC tags with proximity detection
IJ Forster - US Patent 9,767,329, 2017 - Google Patents
Systems, apparatuses and methods provide for detecting the proximate placement of an
external NFC reader to a specific location on a display surface. The display surface can be …
external NFC reader to a specific location on a display surface. The display surface can be …
[PDF][PDF] EMV in a nutshell
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …
Practical relay attack on contactless transactions by using NFC mobile phones
Contactless technology is widely used in security sensitive applications, including
identification, payment and access-control systems. Near Field Communication (NFC) is a …
identification, payment and access-control systems. Near Field Communication (NFC) is a …
Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
Cyber-physical system security of vehicle charging stations
R Gottumukkala, R Merchant, A Tauzin… - 2019 IEEE Green …, 2019 - ieeexplore.ieee.org
Electric Vehicle Supply Equipment (EVSE), also known as charging stations, are available
for charging electric vehicles. EVSE contain computers that are connected to the Internet …
for charging electric vehicles. EVSE contain computers that are connected to the Internet …