{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:13:43Z","timestamp":1725621223848},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906411","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T10:59:25Z","timestamp":1412074765000},"page":"524-529","source":"Crossref","is-referenced-by-count":6,"title":["Security analysis of NFC relay attacks using probabilistic model checking"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Alexiou","sequence":"first","affiliation":[]},{"given":"Stylianos","family":"Basagiannis","sequence":"additional","affiliation":[]},{"given":"Sophia","family":"Petridou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"220","article-title":"Stochastic model checking Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM07)","author":"kwiatkowska","year":"2007","journal-title":"LNCS"},{"journal-title":"ECMA-340 Near Field Communication Interface and Protocol (NFCIP-1)","year":"0","key":"17"},{"journal-title":"ISO\/IEC 18092 2013 Telecommunications and Information Exchange between Systems-Near Field Communication-Interface and Protocol","year":"2013","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"journal-title":"ISO\/IEC FCD 14443 Identification Cards-Contactless Integrated Circuit(s)","year":"2007","key":"16"},{"key":"13","first-page":"74","article-title":"Mafia fraud attack against the rc distance-bounding protocol","author":"mitrokotsa","year":"0","journal-title":"Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352566"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2011.6068658"},{"journal-title":"Isis Mobile Wallet","year":"2013","key":"3"},{"journal-title":"Google Wallet","year":"2013","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.105"},{"journal-title":"Press Release US Wireless Carriers Partner with Big Credit Card Companies","year":"0","author":"rebello","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115307"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.119"},{"key":"5","first-page":"71","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium SS07"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"journal-title":"Marketsandmarkets com Near Field Communication (NFC) Market Global Forecast & Analysis (2011-2016)-Products (NFC Chip Micro SD Card Integrated SIM Reader & Middleware)","year":"0","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","article-title":"PRISM 4.0: Verification of probabilistic real-time systems","author":"kwiatkowska","year":"2011","journal-title":"Proc 23rd International Conference on Computer Aided Verification (CAV11)"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906411.pdf?arnumber=6906411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:39:01Z","timestamp":1602675541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906411","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}