3Michael Roland.Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare, [C] Proceedings of fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU). Newcastle, UK:IEEE Pl~ss,2012:2251-2256.
4Hasoo Eun.Condilional Privacy Preserving Security Protocol for NFC Applications [J].IEEE Transactions on Consumer Electronics,2013,59(1): 153-160.
5Doug Virtual Serfass.Wireless Sensor Networks Devices and Near Field Using Android Communication Peer-To-Peer Emulation [C].Proceedings of Southeastcon conference.Orlando,FL:IEEE Press,2012:453-458.
6Dirar Abu-Saymeh.An Application Secnrity Framework for Near Field Communication [C].Proceedings of the 12th IEEE International Conference on Tnist,Security and Privacy in Computing and Cornmunications.Melbourne,Austra]ia:lEEE Press,2013:396-403.
7Emir Husni.Shopping Application System With Near Field Communication (NFC) Based on Android [C].Proceedings of International Conference on System Engineering and Technology.Bandung, Indonesia:IEEE Press,2012:121-125.