A critical review of mobile payment research

T Dahlberg, J Guo, J Ondrus - Electronic commerce research and …, 2015 - Elsevier
This article aims at assessing the progress of mobile payment research over the last 8 years.
A previous literature review (Dahlberg et al. 2008b), covering articles published between …

A survey on FinTech

K Gai, M Qiu, X Sun - Journal of Network and Computer Applications, 2018 - Elsevier
As a new term in the financial industry, FinTech has become a popular term that describes
novel technologies adopted by the financial service institutions. This term covers a large …

Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

Security and privacy issues: A survey on FinTech

K Gai, M Qiu, X Sun, H Zhao - … 2016, Shenzhen, China, December 17-19 …, 2017 - Springer
As a new term in the financial industry, FinTech has become a popular term that describes
novel technologies adopted by the financial service institutions. This term also covers …

Secure proximity detection for NFC devices based on ambient sensor data

T Halevi, D Ma, N Saxena, T Xiang - … Security, Pisa, Italy, September 10-12 …, 2012 - Springer
In certain applications, it is important for a remote server to securely determine whether or
not two mobile devices are in close physical proximity. In particular, in the context of an NFC …

Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication

HTT Truong, X Gao, B Shrestha… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a
verifier (terminal) without any user interaction. Currently deployed ZIA solutions are …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

Security and privacy implications of NFC-enabled contactless payment systems

N Akinyokun, V Teague - … of the 12th international conference on …, 2017 - dl.acm.org
Nowadays, contactless payments are becoming increasingly common as new smartphones,
tablets, point-of-sale (POS) terminals and payment cards (often termed" tap-and-pay" cards) …

Posture based health monitoring and unusual behavior recognition system for elderly using dynamic Bayesian network

G Anitha, S Baghavathi Priya - Cluster Computing, 2019 - Springer
Video surveillance cameras play a vital role in society. Elderly monitoring is one of the major
applications of surveillance camera. It is observed that most of the elderly people live alone …

Man-in-the-middle attack on contactless payment over NFC communications: design, implementation, experiments and detection

S Akter, S Chellappan, T Chakraborty… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A recent development emanating from RFID technology is Near Field Communication
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …