1ISO/IEC 18092.Information Technology-Telecommunicationsand Information Exchange between Systems-Near FieldCommunication—Interface and Protocol(NFCIP-1)[S].1stEd.Geneva,Switzerland:Joint Technical CommitteeISO/IEC,2004. 被引量:1
2Madlmayr G,Dillinger O,Langer J,et al.The benefit ofusing SIM application toolkit in the context of near fieldcommunication applications for mobile applications[C] //Proceedings of the International Conference on theManagement of Mobile Business.Toronto,Canada:IEEE,2007:1-5. 被引量:1
3Au Y A,Kauffman R J.The economics of mobile payments:Understanding stakeholder issues for an emerging financialtechnology application[J].Electronic Commerce Researchand Applications,2008,7(2):141-146. 被引量:1
4Olga K.Apple plans service that lets iphone users pay withhandsets[Z/OL].(2012-04-21),http://www.bloomberg.com/news/2011-01-25/apple-plans-service-that-lets-iphone-users-pay-with-handsets.html. 被引量:1
5Torr P.Demystifying the threat-modeling process[J].IEEESecurity and Privacy,2005,3(5):66-70. 被引量:1
6Shostack A.Threat modeling series 2007[Z/OL].(2012-04-21),http://blogs.msdn.com/sdl/archive/tags/threat+modeling/default.aspx.published 2007-09and 2007-10. 被引量:1
8Poore R S.International information security foundation,generally accepted system security principles release for publiccomment[Z/OL].(2012-04-23),http://www.infosectoday.com/Articles/gassp.pdf accessed on January11,2010. 被引量:1
9Elahi G,Yu E.A goal oriented approach for modeling andanalyzing security trade-offs[C] //Proceedings of the 26thInternational Conference on Conceptual Modeling.Auckland,New Zealand:Springer,2007:375-390. 被引量:1
10Weis S A,Sarma S E,Rivest R L,et al.Security andprivacy aspects of low-cost radio frequency identificationsystems[C] //Proceedings of the Security in PervasiveComputing 2003.Boppard,Germany:Springer,2004:201-212. 被引量:1