4Researchers from Cambridge. IC cards are vulnerable to MITM attacks [EB/OL]. http://steventalk.wordpress.com/2010/ 02/21/ic-cards-are-vulnerable-to-mitm-attacks/, 2010, 02.
5Eun-Jun Yoon, Kee-Young Yoo, New Authentication Scheme Based on a One-way Hash Function and Diffie-Hell- man Key Exchange [J]. Cryptology and Network Security Lec- ture Notes in Computer Science Volume 3810, 2005, pp 147- 160.
7Rosenberg, Arnold. Better than Cash? Global Proliferation of Payment Cards and Consumer Protection Policy[J]. Columbi- a Journal of Transnational Law, 2006.