Literatur [Jak13] [JR13] [KB12] [Kob87] A. Jakl, NDEF Library for Proximity APIs / NFC, http://ndef. codeplex.com/, July 29, 2013, Zuletzt zugegriffen am 19.09.2013 A. Jakl, M. Roland, Near Field Communication (NFC) Developer Comparison, Version 1.4, 19.09.2013, Zuletzt zugegriffen am 19.09.2013 E. Kalige, D. Burkey, A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware, December 2012 N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation, Volume 48, Nr. 177, pp. 203-209, January 1987 [Lee12] E. Lee, NFC Hacking: The Easy Way, DEF CON 20, July 26-29, 2012 [Mic] [Mil86] Microsoft, Gewusst wie: Speichern von asymmetrischen Schlüsseln in einem Schlüsselcontainer, http://msdn.microsoft.com/de-de/library/ vstudio/tswxhw92.aspx, Zuletzt zugegriffen am 19.09.2013 V. S. Miller, Use of Elliptic Curves in Cryptography, In Proc. of Advances in Cryptology — CRYPTO ’85, LCNS 218, pp. 417-426, 1986 [Mul08] C. Mulliner, Attacking NFC Mobile Phones, EUSecWest, May 21-22, 2008 [NDEF] [Nok11] NFC Forum, NFC Data Exchange Format (NDEF), Technical Specification, 2006-07-24 Nokia, Introduction to NFC, http://developer.nokia.com/Develop/ NFC/Documentation, 2011-07-08, Zuletzt zugegriffen am 18.09.2013 [Poo] I. Poole, NFC Modulation & RF Signal, http: //www.radio-electronics.com/info/wireless/nfc/ near-field-communications-modulation-rf-signal-interface.php, Zuletzt zugegriffen am 18.09.2013 [Ram12] S. Ramaswamy, Deep Dive into the Kernel of .NET on Windows Phone 8, http://channel9.msdn.com/Events/Build/2012/3-005, Zuletzt zugegriffen am 19.09.2013 [Sch96] B. Schneier, Applied Cryptography, Second Edition, Wiley, 1996 [SMK01] J. Scambray, S. McClure, G. Kurtz, Hacking Exposed: Network Security Secrets & Solutions, Second Edition, McGraw-Hill Osborne Media, S. 561- 563, 2001 [Sou13] Sourceforge, NFCProxy, http://sourceforge.net/projects/ nfcproxy/, 2013-02-27, Zuletzt zugegriffen am 18.09.2013 [Tan09] A. S. Tanenbaum, Moderne Betriebssysteme, 3., aktualisierte Auflage, Pearson Studium, 2009 80
Literatur [Vin12] A.J. H. Vinck, Introduction to public key cryptography, S. 16, May 12, 2012 [WP7] WP7 Root Tools, Unlocks explained, http://wp7roottools.com/index. php/guides/unlocks-explained, 17.04.2012, Zuletzt zugegriffen am 18.09.2013 [Zef12] T. Zefferer, Secure Elements am Beispiel Google Wallet, Version 1.0, S. 7-9, 28.04.2012 81