The following publications are possibly variants of this publication:
- Practical Relay Attack on Contactless Transactions by Using NFC Mobile PhonesLishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. iacr, 2011:618, 2011. [doi]
- Practical NFC Peer-to-Peer Relay Attack Using Mobile PhonesLishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. rfidsec 2010: 35-49 [doi]
- Practical NFC Peer-to-Peer Relay Attack using Mobile PhonesLishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. iacr, 2010:228, 2010. [doi]
- Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platformsLishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. icitst 2009: 1-8 [doi]
- Preventing relay attacks in mobile transactions using infrared lightIakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. SAC 2017: 1724-1731 [doi]