References
[1]. Christopher Eric Kay and Palo Alto, (2015). “System
and Method for Conducting a transaction at a financial
transaction terminal using a mobile device”. United States
Patent Publication, 8972297, No. 3.
[2]. D. Monteiro, Joel J. P. C. Rodrigues and Jaime Lloret,
(2012). “A Secure NFC Application for Credit Transfer
Among Mobile Phones”. International Conference on
Computer, Information and Telecommunication Systems
(CITS).
[3]. Emir Husni and Sugeng Purwantoro, (2012).
“Shopping Application System With Near Field
Communication”. International Conference on System
Engineering and Technology (ICSET).
[4]. Frank Morgner, Dominik Oepen, Wolf Muller and
Jens-Peter Redlich, (2013). “Mobile smart card reader
using NFC-enabled smartphones”. ICST Institute for
Computer Science, Social Informatics and
Telecommunications Engineering.
[5]. Gowri and F.W. Jesudas, (2014). “Conditional privacy
preserving security protocol for NFC application”.
International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 3, No. 2, pp. 248 – 254.
[6]. Keith L. Paulsen, (2014). “Method for protecting
cardholder data in a mobile device that performs secure
payment transactions and which enables the mobile
device to function as a securepayment terminal”. United
States Patent Application Publication, Pub. No.: US
2014/0195429, No. 10.
[7]. Koby Levy, Bat-Yam and Ran Katz, (2015). “Multiple
NFC card applications in multiple execution
environment”. Publication US 2012/0178366 A1, No. 10.
[8]. Lishoy Francis, Gerhard Hancke, Keith Mayes and
Konstantinos Markantonakis, (2010). “A Security
Framework Model with Communication Protocol
Translator Interface for Enhancing NFC Transactions”.
Conference on Telecommunications (AICT), pp. 452-461.
[9]. M. Fisher, (2013). “Conducting an online payment
transaction on NFC enabled mobile communication
devices”. United States Patent Application Publication,
publication number US8352323 B2.
[10]. M Fisher and Jackson, (2012). “Scheduling and
paying for banking transaction using NFC enabled
mobile communication device”. United States Patent
Application Publication, No. 29.
[11]. Michael Roland, Josef Langer and Josef Scharinger
th (2013). “Applying Relay Attacks to Google Wallet”. 5
International Workshop on IEEE, pp. 1-6.
[12]. Marc Pasquet, Joan Reynaud and Christophe
Rosenberger, (2008). “Secure Payment With NFC Mobile
Phones In The Smart Touch Project”. International
Symposium on Collaborative Technologies and System.
[13]. Omkar Ghag and Saket Hegde, (2012). “A
Comprehensive Study of Google Wallet as an NFC
Application”. International Journal of Computer
Applications, Vol. 58, No.16, pp. 0975-8887.
[14]. Poonguzhali P, Prajyot Dhanokar, M.K.Chaithanya,
and Mahesh U. Patil, (2014). “Secure Storage of Data on
Android Based Devices”, No. 15.
[15]. Roel Verdult and Francois Kooman, (2011).
“Practical Attacks on NFC Enabled Cell Phones”.
International Workshop on Near Field Communication,
pp. 77-82.
[16]. Scott Goldthwaite and William Graylin, (2004).
“Mobile device equipped with a contactless smart card”
United States Patent Publication ,20040127256 A1, No. 1.
[17]. Subashini Dwivedi, Shraddha Panbude and Rama
Rao, (2014). “Secured Green Payments using NFC Device”.
International Journal of Advanced Research in Computer
Engineering and Technology (IJARCET), Vol. 3, No.11.