1. Near field communication (nfc), http://www.nfc-forum.org/resources/faqs
2. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. Network and Distributed Systems Security Symposium (2002)
3. Barton, J.J., Zhai, S., Cousins, S.: Mobile phones will become the primary personal computing devices. In: IEEE Workshop on Mobile Computing Systems and Applications, April 2006, IEEE, Los Alamitos (2006)
4. Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: Proc. of MobiSys, pp. 51–64 (2005)
5. Cheung, H.: How to: Building a bluesniper rifle - part 1 (March 2005), http://www.tomsnetworking.com/2005/03/08/how_to_bluesniper_pt1