{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:22:12Z","timestamp":1759335732784},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_13","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T11:14:46Z","timestamp":1495106086000},"page":"351-385","source":"Crossref","is-referenced-by-count":7,"title":["RFID and Contactless Technology"],"prefix":"10.1007","author":[{"given":"Anjia","family":"Yang","sequence":"first","affiliation":[]},{"given":"Gerhard P.","family":"Hancke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"13_CR1","unstructured":"R. Das. RAIN RFID 2015\u20132020: Market size, growth opportunities and trends. IDTechEx, 2015."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"H. Stockman. Communication by Means of Reflected Power. Proceedings of the IRE, pp 1196\u20131204, October, 1948.","DOI":"10.1109\/JRPROC.1948.226245"},{"key":"13_CR3","unstructured":"The History of RFID Technology. RFID Journal, December, 2006. http:\/\/www.rfidjournal.com\/article\/articleview\/1338\/1\/129\/ ."},{"key":"13_CR4","unstructured":"Smart Card Alliance. Contactless Technology for Secure Physical Access: Technology and Standards Choices. Publication No. ID-02002, October, 2001."},{"key":"13_CR5","unstructured":"ISO\/IEC 14443. Identification cards \u2013 Contactless integrated circuit cards \u2013 Proximity cards., 2011."},{"key":"13_CR6","unstructured":"ISO\/IEC 15693. Identification cards \u2013 Contactless integrated circuit cards \u2013 Vicinity cards., 2009."},{"key":"13_CR7","unstructured":"ISO\/IEC 18092 (ECMA-340). Information technology\u2013Telecommunications and information exchange between systems\u2013Near Field Communication \u2013 Interface and Protocol (NFCIP-1), 2013."},{"key":"13_CR8","unstructured":"2014 FIFA World Cup with RFID Ticketing Presents Cautionary Tale. June, 2014. https:\/\/www.tsl.com\/2014\/06\/2014-fifa-world-cup-rfid-ticketing-presents-cautionary-tale\/ ."},{"key":"13_CR9","unstructured":"Federal Information Processing Standards. Publication 201-1: Personal Identity Verification (PIV) of Federal Employees and Contractors. March, 2006."},{"key":"13_CR10","unstructured":"Federal Information Processing Standards. Publication 201-2: Personal Identity Verification (PIV) of Federal Employees and Contractors. August, 2013."},{"key":"13_CR11","unstructured":"Smart Card Alliance. http:\/\/www.smartcardalliance.org\/ ."},{"key":"13_CR12","unstructured":"International Civil Aviation Organization (ICAO). Document 9303 Machine Readable Travel Documents (MRTD). Part I: Machine Readable Passports, Seventh Edition, 2015."},{"key":"13_CR13","unstructured":"ISO\/IEC 7501 Identification cards \u2013 Machine readable travel documents, 2008."},{"key":"13_CR14","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Advanced Security Mechanisms for Machine Readable Travel Documents\u2019 Extended Access Control (EAC). Technical Guideline TR-03110, September, 2007."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"T.S. Heydt-Benjamin, D.V. Bailey, K. Fu, A. Juels and T. O\u2018Hare. Vulnerabilities in first-generation RFID-enabled credit cards. Technical report, University of Massachusetts Amherst, October 2006.","DOI":"10.1007\/978-3-540-77366-5_2"},{"key":"13_CR16","unstructured":"EMVCo. EMV Contactless Communication Protocol Specification v2.5. June, 2015."},{"key":"13_CR17","unstructured":"EMV Integrated Circuit Card Specifications for Payment Systems-Book 1: Application Independent ICC to Terminal Interface Requirements. v4.3, November, 2011. https:\/\/www.emvco.com\/specifications.aspx?id=223 ."},{"key":"13_CR18","unstructured":"K. Finkenzeller, RFID Handbook: Radio-frequency identification fundamentals and applications, Wiley, 1999."},{"key":"13_CR19","unstructured":"J.G. Proakis. Digital Communications, 5th Edition, McGraw-Hill, 2007."},{"key":"13_CR20","unstructured":"J.G. Proakis and M. Salehi. Communication Systems Engineering, 2rd Edition, Prentice-Hall, 2002."},{"key":"13_CR21","unstructured":"ISO\/IEC 18000. ISO\/IEC 18000 Information Technology AIDC Techniques-RFID for Item Management \u2013 Air Interface, 2010."},{"key":"13_CR22","unstructured":"Institute for Prospective Technological Studies. RFID Technologies: Emerging Issues, Challenges and Policy Options, Technical Report EUR 22770 EN, 2007."},{"key":"13_CR23","unstructured":"Marcus Gemeinder. Touch & Travel C NFC based automatic fare collection using a passive infrastructure. NFC Forum: Transport and City Life focus group, 2008."},{"key":"13_CR24","unstructured":"Irancell demonstrates NFC payments and ticketing. http:\/\/www.nfcworld.com\/2012\/01\/13\/312430\/irancell-demonstrates-nfc-payments-and-ticketing\/ , 2012."},{"key":"13_CR25","unstructured":"Google announces NFC-based Android Beam for sharing between phones (video). http:\/\/www.engadget.com\/2011\/10\/18\/google-announces-nfc-based-android-beam-for-sharing-between-phon\/ , 2011."},{"key":"13_CR26","unstructured":"Google Wallet. https:\/\/en.wikipedia.org\/wiki\/Google_Wallet ."},{"key":"13_CR27","unstructured":"Apple Pay. https:\/\/en.wikipedia.org\/wiki\/Apple_Pay ."},{"key":"13_CR28","unstructured":"ECMA-340 Near Field Communication Interface and Protocol (NFCIP-1) 3nd Edition, June, 2013. http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-340.htm ."},{"key":"13_CR29","unstructured":"NFC Forum. http:\/\/www.nfc-forum.org\/ ."},{"key":"13_CR30","unstructured":"ETSI TS 102 613-V11.0.0. Smart cards: UICC\u2013 contactless Front-end (CLF) Interface; Part1: Physical and data link layer characteristics. September, 2012."},{"key":"13_CR31","unstructured":"ETSI TS 102 622-V11.1.0 Smart cards: UICC\u2013 Contactless Front-end (CLF) Interface; Host Controller Interface (HCI). October, 2012."},{"key":"13_CR32","unstructured":"SimplyTapp proposes secure elements in the cloud. http:\/\/www.nfcworld.com\/2012\/09\/19\/317966\/simplytapp-proposes-secure-elements-in-the-cloud\/ , 2012."},{"key":"13_CR33","unstructured":"Host-based Card Emulation. https:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce.html ."},{"key":"13_CR34","unstructured":"CyanogenMod. https:\/\/en.wikipedia.org\/wiki\/CyanogenMod ."},{"key":"13_CR35","unstructured":"GlobalPlatforms Proposition for NFC Mobile: Secure Element Management and Messaging. Online whitepaper, GlobalPlatform, April, 2009."},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Lishoy Francis, Gerhard Hancke, Keith Mayes and Konstantinos Markantonakis. Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. In: Radio Frequency Identification: Security and Privacy Issues, pages 35\u201349, LNCS, Springer, 2010.","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"13_CR37","unstructured":"Sun Microsystems, JSR-000118 Mobile Information Device Profile 2.0, https:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr118\/index.html , 2010."},{"key":"13_CR38","unstructured":"Lishoy Francis, Gerhard Hancke, Keith Mayes and Konstantinos Markantonakis. Practical Relay Attack on contactless Transactions by Using NFC Mobile Phones. In: Journal of Radio Frequency Identification System Security RFIDsec\u201912 Asia Workshop Proceedings, pages 21\u201332, IOS Press, 2013."},{"key":"13_CR39","unstructured":"Michael Roland and Josef Langer, Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless. In 7th Usenix Workshop on Offensive Technologies, Washington, D.C., 2013."},{"key":"13_CR40","unstructured":"OpenPCD Project. http:\/\/www.openpcd.org ."},{"key":"13_CR41","unstructured":"rfdump Project. http:\/\/www.rfdump.org\/ ."},{"key":"13_CR42","unstructured":"rfidiot Project. http:\/\/www.rfidiot.org\/ ."}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T20:17:14Z","timestamp":1569356234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_13","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}