References
- NFC Forum, "What is NFC?", http://www.nfc-forum.org/aboutnfc/
- Zigbee Alliance, "Understanding ZigBee", http://www.zigbee.org/About/UnderstandingZigBee.aspx
- Bluetooth Special Interest Group, "Bluetooth Basics", http://www.bluetooth.com/Pages/Basics.aspx
- 이유지, "KT텔레캅, NFC 적용한 출입통제시 스템 개발", 디지털 데일리, 2011년 5월 24일, http://www.kttelecop.co.kr/jsp/board/board.jsp?sa=ci&bid=8&pg=2&no=5181
- Darren Murphy, "Charge Anywhere update turns Nexus S into full-on mobile payment terminal", Engadget, 2011년 3월 25일, http://www.engadget.com/2011/03/25/charge-anywhere-update-turns-nexus-s-into-full-on-mobile-payment/
- ISO/IEC 14443, Identification cards-Contractless integrated circuit cards-Proximity cards, ISO, Geneva, Switzerland, 2008
- Ernst Haselsteiner and Klemens Breitfuss, "Security in near field communication (NFC)," Philips Semiconductors Workshop on RFID Security(RFIDSec 06), July 2006
- ECMA International, "NFC-SEC NFCIP-1 Security Services and Protocol, Cryptography Standard using ECDH and AES", Ecma/TC47/2008/089, http://www.ecmainternational.org/activities/Communications/tc47-2008-089.pdf
- Joan Daemen and Vincent Rijmen, "The Design of Rijndael: AES-The Advanced Encryption Standard." Springer, 2002. ISBN 3-540-42580-2
- Pablo Holman, "How to hack RFID-enabled Credit Cards for $8", BoingBoingTV, http://www.youtube.com/watch?v=vmajlKJlT3U
- NXP Semiconductor, MIFARE Classic - a pioneer and front runner in contactless smart card ICs, http://www.nxp.com/products/identification_and_security/smart_card_ics/mifare_smart_card_ics/mifare_classic/
- Gerhard P. Hancke, "A practical relay attack on ISO/IEC 14443 proximity cards", Project Report, 2005년 1월
- Dan Balaban, "Tansport for London to Discard Mifare classic", NFC times, Jan. 21, 2010, http://www.nfctimes.com/news/transport-london-discard-mifare-classic-seeks-desfire-sims
- 길민권, "해킹 시연 'RFID 적용 탄약고.물류센터 등 해킹에 무방비'," 보안뉴스, 2007년 5월 22일, http://www.boannews.com/media/view.asp?idx=6226&kind=2
- T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O'Hare. "Vulnerabilities in first-generation RFID-enabled credit cards". In Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, Vol. 4886, pages 2-14, Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007.
- Thomas Ricker, "Duch RFID e-passport cracked-US next?" Engadget, 2006년 2월 23일, http://www.engadget.com/2006/02/03/dutch-rfid-e-passport-cracked-us-next/
- 양진비, "전자여권, 10분이면 감쪽같이 '해킹'", 프레시안, 2008년 9월 29일, http://www.pressian.com/article/article.asp?articlenum=60080929141547&Section=
- Hsu-Chen Cheng, Wen-Wei Liao, Tian-Yow Chi and Siao-Yun Wei, "A secure and practical key management mechanism for NFC read-write mode", The 13th International Conference on Advanced Communication Technology(ICACT), Feb. 13-16, 2011, Seoul, Korea, 2011
- Sandeep Tamrakar, Jan-Erik Ekberg and N. Asokan, "Identity Verification Schemes for Public Transport Ticketing with NFC Pohones", Proceedings of the sixth ACM workshop on Scalable trusted computing, OCT. 17-21, Chicago, USA, 2011
- Wei-Dar Chen, Mayes, K.E, Yuan-Hung Lien and Jung-Hui Chiu, "NFC Mobile Payment with Citizen Digital Certificate", The 2nd International Conference on Next Generation Information Technology (ICNIT), Jun. 21-23, Gyeongju, Korea, 2011
- Wei-Dar Chen, Mayes, K.E, Yuan-Hung Lien and Jung-Hui Chiu, "NFC Mobile Transactions and Authentication based on GSM Network", The 2nd International Workshop on Near Field Communication, Apr. 20-20, Monaco, 2010
- Wei-Dar Chen, Mayes, K.E, Yuan-Hung Lien and Jung-Hui Chiu, "Using 3G Network Components to Enable NFC Mobile Transactions and Authentication", 2010 IEEE International Conference on Progress Informatics and Computing (PIC), Dec. 10-12, Sanghai, China, 2010
- 이민구, 김동완, 손진수, "시간제 차량 임대 사업과 NFC 활용", R&D Horizon, Vol. 25, No. 2, Jun. 2011
- Nakhjiri and Nakhjiri, AAA and Network Security for Mobile Access, Wiley, 2005
- Carl Rigney, Allan C. Rubens, William Allen Simpson and Steve Willens, "Remote Authentication Dial In User Service (RADIUS)", RFC 2865, http://ietf.org/rfc/rfc2865.txt
- Pat R. Calhoun, John Loughney, Jari Arkko, Erik Guttman and Glen Zorn, "Diameter Base Protocol", RFC 3588, http://ietf.org/rfc/rfc3588.txt
- Brian Lloyd and William Allen Simpson, "PPP Authentication Protocols", RFC 1334, http://ietf.org/rfc/rfc1334.txt
- Bernard Aboba, Larry J. Blunk, John R. Vollbrecht, James Carlon and Henrik Levkowetz, "Extensible Authentication Protocol(EAP)", RFC 3748, http://ietf.org/rfc/rfc3748.txt
- Jari Arkko and Henry Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)", RFC 4187, http://ietf.org/rfc/rfc4187.txt
- Bernard Aboba and Dan Simon, "PPP EAP TLS Authentication Protocol", RFC 2716, http://ietf.org/rfc/rfc2716.txt
- Paul Funk and Simon Blake-Wilson, "Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)", RFC 5281, http://ietf.org/rfc/rfc5281.txt
- Florent Bersani and Hannes Tschofenig, "The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method", RFC 4764, http://ietf.org/rfc/rfc4764.txt
Cited by
- An Implementation of Car Navigation System using NFC vol.18, pp.5, 2014, https://doi.org/10.6109/jkiice.2014.18.5.1194
- Design and Implementation of Exercise Machines Reservation System for Fitness Center vol.20, pp.3, 2016, https://doi.org/10.6109/jkiice.2016.20.3.599