-
1
-
-
84873695206
-
Chip-and-PIN:Success and Challenges in Reducing Fraud
-
Available: Jan. 30
-
Douglas King, "Chip-and-PIN:Success and Challenges in Reducing Fraud" Retail Payments Risk Forum, January, 2012. [Online]. Available: www.frbatlanta.org/documents/rprf/rprf-pubs/120111-wp.pdf [Jan. 30, 2012].
-
(2012)
Retail Payments Risk Forum, January, 2012. [Online]
-
-
King, D.1
-
2
-
-
84867189661
-
-
Version 1.0, May [Online]. Available: [Oct. 10, 2011]
-
A Guide to EMV, Version 1.0, May 2011. [Online]. Available: http://www.emvco.com/best-practices.aspx?id=217 [Oct. 10, 2011].
-
(2011)
A Guide to EMV
-
-
-
4
-
-
77955217681
-
Chip and Pin is Broken
-
S. J. Murdoch, S. Drimer, R. Anderson, and M. Bond, "Chip and Pin is Broken "IEEE Symposium on Security and Privacy, p 433-446, 2010,
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 433-446
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
5
-
-
84867147996
-
-
[Online]. Available: June 12
-
2010 IEEE Symposium on Security and Privacy, SP 2010. pp. 433-444. [Online]. Available: www.cl.cam.ac.uk/-sjm217/papers/oakland10chipbroken.pdf [June 12, 2011].
-
(2011)
2010 IEEE Symposium on Security and Privacy, SP 2010
, pp. 433-444
-
-
-
7
-
-
50249185653
-
Thinking inside the box: System-level failures of tamper proofing
-
[Online]. Available: Sep. 9
-
Drimer, S., Murdoch, S.J., Anderson, R. "Thinking inside the box: system-level failures of tamper proofing". In IEEE Symposium on Security and Privacy (Oakland).(May 2008) pp. 281 - 295. [Online]. Available: www.cl.cam.ac.uk/techreports/UCAM-CL-TR- 711.pdf [Sep. 9, 2011].
-
(2011)
IEEE Symposium on Security and Privacy (Oakland).(May 2008)
, pp. 281-295
-
-
Drimer, S.1
Murdoch, S.J.2
Anderson, R.3
-
8
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Available: Sep. 12
-
Saar Drimer and Steven J. Murdoch. Keep your enemies close: Distance bounding against smartcard relay attacks. In USENIX Security Symposium, August 2007. [Online]. Available: www.saardrimer.com/sd410/pres/usenix07-relay.pdf [Sep. 12, 2011].
-
(2011)
USENIX Security Symposium, August 2007. [Online]
-
-
Drimer, S.1
Murdoch, S.J.2
-
10
-
-
50249147588
-
-
March [Online]. Available: Sep. 14
-
Ross Anderson, Mike Bond and Steven J. Murdoch. "Chip and spin", March 2005. [Online]. Available: http://www.chipandspin.co.uk/spin. pdf [Sep. 14, 2011].
-
(2005)
Chip and Spin
-
-
Anderson, R.1
Bond, M.2
Murdoch, S.J.3
-
11
-
-
84867147995
-
-
[Online]. Available: Sep. 15
-
Steve J. Murdoch, University of Cambridge Computer Laboratory, 2009 [Online]. Available: www.cl.cam.ac.uk/-sjm217/papers/deaeslr09reliability.pdf [Sep. 15, 2011].
-
(2009)
-
-
Murdoch, S.J.1
-
12
-
-
84890007935
-
Smart cards for Banking and Finance
-
New York: Springer Science+Business Media, LLC. NY
-
Keith E. Mayes and Konstantinos Markantonaiks, "Smart cards for Banking and Finance" in Smart cards, tokens, security and applications, New York: Springer Science+Business Media, LLC. NY, 2008, pp. 120-125.
-
(2008)
Smart Cards, Tokens, Security and Applications
, pp. 120-125
-
-
Mayes, K.E.1
Markantonaiks, K.2
-
13
-
-
84867189666
-
-
Digital Security Group, Radboud University Nijimegen, Netherlands. [Online] Available: [Dec. 14, 2011]
-
Joeri de Riuter and Erik Poll, Formal Analysis of EMV Protocol Suite, Digital Security Group, Radboud University Nijimegen, Netherlands. 2011 [Online] Available: http://www.cs.ru.nl/E.Poll/papers/emv.pdf [Dec. 14, 2011].
-
(2011)
Formal Analysis of EMV Protocol Suite
-
-
De Riuter, J.1
Poll, E.2
-
14
-
-
75149156103
-
Failures of Tamper-Proofing in PIN Entry Devices
-
Nov-Dec [Online]. Available: Sep. 16
-
Saar Drimer, Steven Murdoch and Ross Anderson, "Failures of Tamper-Proofing in PIN Entry Devices" in IEEE Security and Privacy v 7 no 6 (Nov-Dec 09), pp. 39-45. [Online]. Available: www.cl.cam.ac.uk/-sjm217/papers/ ieeesp09tamper.pdf [Sep. 16, 2011].
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.6
, pp. 39-45
-
-
Drimer, S.1
Murdoch, S.2
Anderson, R.3
-
15
-
-
84867189664
-
Phish and chips (traditional and new recipes for attacking EMV)
-
Security Protocols Workshop (Cambridge, England, March 2006), Springer (to appear). [Online]. Available: Sep.15
-
Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S. J., Anderson, R. J., and Rivest, R. L. Phish and chips (traditional and new recipes for attacking EMV). In Security Protocols Workshop (Cambridge, England, March 2006), LNCS, Springer (to appear). [Online]. Available: www.cl.cam.ac.uk/-rja14/Papers/Phish- and-Chips.pdf [Sep.15, 2011].
-
(2011)
LNCS
-
-
Adida, B.1
Bond, M.2
Clulow, J.3
Lin, A.4
Murdoch, S.J.5
Anderson, R.J.6
Rivest, R.L.7
-
16
-
-
70350416988
-
Optimised to fail: Card readers for online banking
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg [Online]. Available: Sep.16
-
Drimer, S., Murdoch, S.J., Anderson, R." Optimised to fail: Card readers for online banking". In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 184-200. Springer, Heidelberg (2009) [Online]. Available: www.cl.cam.ac.uk/-sjm217/papers/fc09optimised.pdf [Sep.16, 2011].
-
(2009)
LNCS
, vol.5628
, pp. 184-200
-
-
Drimer, S.1
Murdoch, S.J.2
Anderson, R.3
-
18
-
-
84867149841
-
-
[Online]. Available: Sep. 17
-
Ross Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajan. "Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV", 2010 [Online]. Available: www.cl.cam.ac.uk/-osc22/docs/fc11- p2pemv.pdf [Sep. 17, 2011].
-
(2010)
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV
-
-
Anderson, R.1
Bond, M.2
Choudary, O.3
Murdoch, S.J.4
Stajan, F.5
-
20
-
-
84873650884
-
-
[Online]. Available: Nov. 19
-
L. Padilla, "Breaking Visa PIN" [Online]. Available: www.gae.ucm.es/-padilla/extrawork/visapvv.html [Nov. 19, 2011].
-
(2011)
Breaking Visa PIN
-
-
Padilla, L.1
-
21
-
-
84867152553
-
Fraud dynamics in the card payments industry: A global review of the realities of EMV deployment
-
January, 2010
-
Toni Merschen, Fraud dynamics in the card payments industry: A global review of the realities of EMV deployment, In: Journal of Payments strategy & systems, Bd. 4 (2010), 2, S.156-169. January, 2010.
-
(2010)
Journal of Payments Strategy & Systems
, vol.4
, Issue.2
, pp. 156-169
-
-
Merschen, T.1
|