1. B. Schneier, J.K. (n.d.). Twofish: A 128-Bit Block Cipher. Retrieved from http://www.schneier.com/paper-twofish-paper.html.
2. Cheng, H.C., Chen, J.W., Chi, T.Y., & Chen, P.H. (2009, February). A generic model for NFC-based mobile commerce. In Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on (Vol. 3). IEEE.
3. Conde-Lagoa, D., Costa-Montenegro, E., Gonzalez-Castao, F.J., & Gil-Castieira, F. (2010, January). Secure eTickets based on QR-Codes with user-encrypted content. In Consumer Electronics (ICCE), 2010 Digest of Technical Papers International Conference on (pp. 257-258).
4. IEEE. Denso-wave. Retrieved from: http://www.denso-wave.com/qrcode/index-e.html.
5. Dodson, B., Sengupta, D., Boneh, D., & Lam, M.S. (2012). Secure, consumer-friendly web authentication and payments with a phone. Mobile Computing, Applications, and Services, 17-38.