1. S. Grotta "COVID-19 and Debit and Alternative Payments Products " https://www.mercatoradvisorygroup.com/covid-19-and-debit-and-alternative-payments-products/ 2020. S. Grotta "COVID-19 and Debit and Alternative Payments Products " https://www.mercatoradvisorygroup.com/covid-19-and-debit-and-alternative-payments-products/ 2020.
2. H. Keni , M. Earle , and M. Min , " Product authentication using hash chains and printed qr codes," in 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) . IEEE , 2017 , pp. 319 -- 324 . H. Keni, M. Earle, and M. Min, "Product authentication using hash chains and printed qr codes," in 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2017, pp. 319--324.
3. Quick response code secure: a crypto-graphically secure anti-phishing tool for qr code attacks," in International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security;Mavroeidis V.;Springer,2017
4. S. Sung , J. Lee , J. Kim , J. Mun , D. Won et al., "Security analysis of mobile authentication using qr-codes," in Computer Science & Information Technology-Computer Science Conference Proceedings , 2015 . S. Sung, J. Lee, J. Kim, J. Mun, D. Won et al., "Security analysis of mobile authentication using qr-codes," in Computer Science & Information Technology-Computer Science Conference Proceedings, 2015.
5. X. Bai , Z. Zhou , X. Wang , Z. Li , X. Mi , N. Zhang , T. Li , S.-M. Hu , and K. Zhang , " Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment," in 26th USENIX Security Symposium (USENIX Security 17) , 2017 , pp. 593 -- 608 . X. Bai, Z. Zhou, X. Wang, Z. Li, X. Mi, N. Zhang, T. Li, S.-M. Hu, and K. Zhang, "Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment," in 26th USENIX Security Symposium (USENIX Security 17), 2017, pp. 593--608.