1. Attacking smart card systems: Theory and practice;Markantonakis;Inf. Security Tech. Rep.,2009
2. Distance-bounding for rfid: Effectiveness of terrorist fraudin the presence of bit errors;Hancke,2012
3. Security challenges for user-oriented rfid applications within the “internet of things”;Hancke;J. Internet Technol.,2010
4. Practical eavesdropping and skimming attacks on high-frequency rfid tokens;Hancke;J. Comput. Security,2011
5. Potential misuse of nfc enabled mobile phones with embedded security elements as contactless attack platforms;Francis,2009