4Fluhrer S, Mantin I, Shamir A. Weaknesses in the Key Scheduling Algorithm of RC4[C]//Proc. of the 8th Annual Workshop on Selected Areas in Cryptography. Toronto, Canada: [s. n.]: 2001.
5Cam-Winget N, Housley R, Wagner D, et al. Security Flaws in 802.11 Data Link Protocols[J]. Communications of the ACM, 2003, 46(5): 35-39.
6Shaked Y, Wool A. Cracking the Bluetooth PIN[C]//Proc. of the 3rd USENIX/ACM Conference on Mobile Systems, Application and Service. Taipei, China: ACM Press, 2005.
7NFC Forum. ECMA-340-2004 Near Field Communication Interface and Protocol(NFCIP-1)[S]. 2004.
8NFC Forum. ECMA-352-2004 Near Field Communication Interface and Protocol(NFCIP-2)[S]. 2003.
9Channame T. How NFC Can to Speed Bluetooth Transactions Today[EB/OL]. (2006-02-14). http://www.eetimes.com/design/ communications-design/4012606/How-NFC-can-to-speed-Bluetooth-transactions-151-today.
10International Telecommunication Union, Internet Reports 2005: The Internet of Things[S]. Geneva: ITU,2005.