[1]Shobha N S S, Aruna K S P, Bhagyashree M D P, et al. NFC and NFC payments: A review[C] Proc of 2016 Int Conf on ICT in Business Industry & Government (ICTBIG). Piscataway, NJ: IEEE, 2016: 17[2]Yang J H, Lin P Y. A mobile payment mechanism with anonymity for cloud computing[J]. Journal of Systems and Software, 2016, 116: 6974[3]Coskun V, Ozdenizci B, Ok K. A survey on near field communication (NFC) technology[J]. Wireless Personal Communications, 2013, 71(3): 22592294 [4]Thammarat C. Efficient and secure NFC authentication for mobile payment ensuring fair exchange protocol[J]. Symmetry, 2020, 12(10): 1649 [5]European Standards. ISOIEC 18092 Information Technology—Telecommunications and Information Exchange between Systems—Near Field CommunicationInterface and Protocol (NFCIP1)[SOL]. 2004 [20221124]. https:www.enstandard.euisoiec18092informationtechnologytelecomm unicationsandinformationexchangebetweensystemsnearfieldcommunicationinterfaceandprotocolnfcip1[6]Fischer J. NFC in cell phones: The new paradigm for an interactive world[J]. IEEE Communications Magazine, 2009, 47(6): 2228 [7]Abouhogail R A. A new secure lightweight authentication protocol for NFC mobile payment[J]. International Journal of Communication Networks and Information Security, 2019, 11(2): 283289 [8]Bojjagani S, Sastry V N. A secure endtoend proximity NFCbased mobile payment protocol[J]. Computer Standards & Interfaces, 2019, 66: 103348 [9]Pourghomi P, Saeed M Q, Ghinea G. A secure cloudbased NFC mobile payment protocol[J]. International Journal of Advanced Computer Science and Applications, 2014, 5(10): 2431[10]Nashwan S. Secure authentication protocol for NFC mobile payment systems[J]. International Journal of Computer Science and Network Security, 2017, 17(8): 256262 [11]Chen X, Choi K, Chae K. A secure and efficient key authentication using bilinear pairing for NFC mobile payment service[J]. Wireless Personal Communications, 2017, 97(1): 117 [12]Khan W, Ullah H. Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography[J]. International Journal of Computer Science Issues, 2010, 7(3): 1015[13]digwatch. Standard ECMA E386 NFCSEC01: NFCSEC Cryptography Standard Using ECDH and AES[SOL]. 2010 [20221124]. https:dig.watchresourcestandardecma386nfcsec01nfcseccryptographystandardusingecdhandaes[14]祝烈煌, 刘哲理. 数据安全与隐私计算[J]. 信息安全研究, 2022, 8(10): 954955[15]Benarous L, Kadri B, Bitam S, et al. Privacypreserving authentication scheme for onroad ondemand refilling of pseudonym in VANET[J]. International Journal of Communication Systems, 2020, 33(10): e4087 [16]Gao T, Deng X, Li Q, et al. APPAS: A privacypreserving authentication scheme based on pseudonym ring in VSNs[J]. IEEE Access, 2019, 7: 6993669946 [17]高小龙, 王玉, 安鹏, 等. 一种适用于大规模场景的匿名电子投票系统[J]. 信息安全研究, 2022, 8(10): 990999[18]Eun H, Lee H, Oh H. Conditional privacy preserving security protocol for NFC applications[J]. IEEE Trans on Consumer Electronics, 2013, 59(1): 153160 [19]He D, Kumar N, Lee J H. Secure pseudonymbased near field communication protocol for the consumer Internet of things[J]. IEEE Trans on Consumer Electronics, 2015, 61(1): 5662[20]Odelu V, Das A K, Goswami A. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms[J]. IEEE Trans on Consumer Electronics, 2016, 62(1): 3038[21]Xu Jie, Xue Kaiping, Yang Qingyou, PSAP: Pseudonymbased secure authentication protocol for NFC applications[J]. IEEE Trans on Consumer Electronics, 2018, 64(1): 8391[22]Ghafoorian M, Nikooghadam M. An anonymous and secure key agreement protocol for NFC applications using pseudonym[J]. Wireless Networks, 2020, 26(6): 42694285[23]Singh M M, Adzman K, Hassan R. Near field communication (NFC) technology security vulnerabilities and countermeasures[J]. International Journal of Engineering & Technology, 2018, 7: 298305
|