|
[1]Atzori, L. et al. 2010. The Internet of Things: A survey. Computer Networks. 54, (2010), 2787–2805. DOI= http://linkinghub.elsevier.com/retrieve/pii/S1389128610001568 [2]Miorandi, D. et al. 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks. 10, 7 (Sep. 2012), 1497–1516. DOI= http://linkinghub.elsevier.com/retrieve/pii/S1570870512000674 [3]Freescale Overcoming the Size and Power Trade off in Wearable Designs. [4]Processor IP Enabling the Wearable Trend: 2014. http://semiengineering.com/processor-ip-enabling-the-wearable-trend/. Accessed: 2015-05-21. [5]Mi Band - Mi Singapore: http://www.mi.com/sg/miband/ - 05. Accessed: 2015-08-26. [6]Wearable Payments: Failure in 2011, Success in 2015? http://vision.visaeurope.com/wearable-payments-failure-in-2011-success-in-2015/. Accessed: 2015-07-13. [7]Bluetooth SIG 2014. Bluetooth Core Specification Version 4.2. [8]Bluetooth Smart: http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx. Accessed: 2015-07-12. [9]Dementyev, A. et al. 2013. Power consumption analysis of Bluetooth Low Energy, ZigBee and ANT sensor nodes in a cyclic sleep scenario. 2013 IEEE International Wireless Symposium (IWS) (Apr. 2013), 1–4. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6616827 [10]100 Swedish Eurocard Customers Test Mobile Payment With Mobile Telephones Equipped With Bluetooth: 2001. http://www.wirelessdevnet.com/news/2001/136/news8.html. Accessed: 2015-08-05. [11]Eurocard to test wireless payment in Swedish stores: 2001. http://www.mycustomer.com/topic/technology/eurocard-test-wireless-payment-swedish-stores. Accessed: 2015-08-05. [12]Finextra news: Ericsson and Eurocard to test Bluetooth payments: 2001. http://www.finextra.com/news/fullstory.aspx?newsitemid=1771. Accessed: 2015-08-05. [13]Hedman, J. and Henningsson, S. 2012. Competition and collaboration shaping the digital payment infrastructure. Proceedings of the 14th Annual International Conference on Electronic Commerce - ICEC ’12 (New York, New York, USA, Aug. 2012), 178–185. DOI= http://dl.acm.org/citation.cfm?id=2346536.2346571 [14]Zolfaghar, K. and Mohammadi, S. 2009. Securing Bluetooth-based payment system using honeypot. 2009 International Conference on Innovations in Information Technology (IIT) (Dec. 2009), 21–25. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5413764 [15]Nan, J. et al. 2009. A mobile Micropayment Protocol Based on Chaos. 2009 Eighth International Conference on Mobile Business. DOI= http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5169273 [16]Xu, J. et al. 2013. Pairing and Authentication Security Technologies in Low-Power Bluetooth. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (Aug. 2013), 1081–1085. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6682199 [17]Saravanan, K. and Yuvaraj, D. 2010. An new secure mechanism for bluetooth network. 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE) (Feb. 2010), 202–205. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5451967 [18]Xin, Y. and Ting, Y. A Security Architecture Based on User Authentication of Bluetooth. 2009 International Forum on Information Technology and Applications. DOI= http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5232204 [19]Xu, G. L. and Yu, B. Security Enhanced Design of the Bluetooth Simple Pairing Protocol. 2011 International Conference on Computer Science and Network Technology. DOI= http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6181960 [20]Diallo, A.S. et al. 2014. A Secure Authentication Scheme for Bluetooth Connection. 2014 International Conference on Computer and Communication Engineering (Sep. 2014), 60–63. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7031600 [21]Bluetooth 4.0: Low Energy: 2010. http://chapters.comsoc.org/vancouver/BTLER3.pdf. Accessed: 2015-06-16. [22]WiFi Jammer - Bluetooth Jammer - WiFi Blocker Wholesales: http://www.jammerfromchina.com/categories/WiFi%7B47%7DBluetooth_Jammers/. Accessed: 2015-08-21. [23]WiFi Jammers, Bluetooth blockers, 2.4 GHz 5 GHz signal jamming devices: http://www.jammer-store.com/wifi-bluetooth-jammers-blockers.html. Accessed: 2015-08-21. [24]WiFi Signal Jammer - Bluetooth Signal Jammer - WiFi Signal Blocker Wholesales: http://www.jammerinthebox.com/categories/WiFi_%26_Bluetooth_Signal_Jammer/. Accessed: 2015-08-21. [25]Yu, B. and Li, H. 2008. Research and Design of One Key Agreement Scheme in Bluetooth. 2008 International Conference on Computer Science and Software Engineering (2008), 665–668. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4722430 [26]Blass, E.-O. et al. 2009. PSP. Proceedings of the 8th ACM workshop on Privacy in the electronic society - WPES ’09 (New York, New York, USA, Nov. 2009), 51. DOI= http://dl.acm.org/citation.cfm?id=1655188.1655196 [27]Gaur, A. and Ondrus, J. 2012. The role of banks in the mobile payment ecosystem. Proceedings of the 14th Annual International Conference on Electronic Commerce - ICEC ’12 (New York, New York, USA, Aug. 2012), 171–177. DOI= http://dl.acm.org/citation.cfm?id=2346536.2346570 [28]Hedman, J. and Henningsson, S. 2012. Competition and collaboration shaping the digital payment infrastructure. Proceedings of the 14th Annual International Conference on Electronic Commerce - ICEC ’12 (New York, New York, USA, Aug. 2012), 178–185. DOI= http://dl.acm.org/citation.cfm?id=2346536.2346571 [29]Lehdonvirta, V. et al. 2009. UbiPay. Proceedings of the 6th International Conference on Mobile Technology, Application & Systems - Mobility ’09 (New York, New York, USA, Sep. 2009), 1–7. DOI= http://dl.acm.org/citation.cfm?id=1710035.1710036 [30]Oracle Java Platform (JDK), Java SE Library. http://www.oracle.com/technetwork/java/javase/downloads/index.html/ Accessed: 2015-12-15.
|