-
2
-
-
50249185653
-
Thinking inside the box: System-level failures of tamper proofing
-
May
-
S. Drimer, S. J. Murdoch, and R. Anderson, "Thinking inside the box: system-level failures of tamper proofing," in IEEE Symposium on Security and Privacy (Oakland), May 2008, pp. 281-295.
-
(2008)
IEEE Symposium on Security and Privacy (Oakland)
, pp. 281-295
-
-
Drimer, S.1
Murdoch, S.J.2
Anderson, R.3
-
3
-
-
77955217681
-
Chip and PIN is broken
-
May
-
S. J. Murdoch, S. Drimer, R. Anderson, and M. Bond, "Chip and PIN is broken," in IEEE Symposium on Security and Privacy (Oakland), May 2010.
-
(2010)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
4
-
-
84914110310
-
-
Le Parisien, 24 January
-
S. Sellami, "L'imparable escroquerie à la carte bancaire," Le Parisien, 24 January 2012, http://www.leparisien.fr/faitsdivers/l-imparable-escroquerie-a-la-carte-bancaire-24-01-2012-1826971.php.
-
(2012)
L'Imparable Escroquerie À la Carte Bancaire
-
-
Sellami, S.1
-
6
-
-
82155196488
-
-
Home Office, Statistical Bulletin, April
-
D. Moon, J. Flatley, J. Hoare, B. Green, and R. Murphy, "Acquisitive crime and plastic card fraud: Findings from the 2008/09 British crime survey," Home Office, Statistical Bulletin, April 2010, http://webarchive.nationalarchives.gov.uk/20110218135832/http://rds.homeoffice.gov.uk/rds/pdfs10/hosb0810.pdf.
-
(2010)
Acquisitive Crime and Plastic Card Fraud: Findings from the 2008/09 British Crime Survey
-
-
Moon, D.1
Flatley, J.2
Hoare, J.3
Green, B.4
Murphy, R.5
-
9
-
-
84914110309
-
-
Type Approval, November, version 4.3a
-
EMVCo, LLC, "Terminal level 2, test cases," Type Approval, November 2011, version 4.3a.
-
(2011)
Terminal Level 2, Test Cases
-
-
EMVCo, LLC,1
-
10
-
-
84914173082
-
-
EMVCo, LLC, June
-
EMV 4.2, EMVCo, LLC, June 2004, http://www.emvco.com/.
-
(2004)
EMV 4.2
-
-
-
12
-
-
84914110308
-
Jackpotting automated teller machines redux
-
July
-
B. Jack, "Jackpotting automated teller machines redux," Presentation at Black Hat USA, July 2010, http://blackhat.com/html/bh-us-10/bh-us-10-archives.html#Jack.
-
(2010)
Presentation at Black Hat USA
-
-
Jack, B.1
-
13
-
-
84914110307
-
-
Credit Call
-
EMV.LIB Integration Guide, Credit Call, 2009, http://www.level2kernel.com/emvlib documentation.html.
-
(2009)
EMV.LIB Integration Guide
-
-
-
14
-
-
84914110306
-
-
SC Magazine, October
-
ATM Malware, SC Magazine, October 2013, http://www.pcworld.com/article/2058360/atm-malwaremay-spread-from-mexico-to-englishspeaking-world.html.
-
(2013)
ATM Malware
-
-
-
15
-
-
84914094299
-
Formal analysis of the EMV protocol suite
-
ser. LNCS, S. Moedersheim and C. Palamidessi, Eds., Springer, March
-
J. de Ruiter and E. Poll, "Formal analysis of the EMV protocol suite," in Theory of Security and Applications (TOSCA 2011), ser. LNCS, S. Moedersheim and C. Palamidessi, Eds., vol. 6693. Springer, March 2011, pp. 113-129.
-
(2011)
Theory of Security and Applications (TOSCA 2011)
, vol.6693
, pp. 113-129
-
-
De Ruiter, J.1
Poll, E.2
-
16
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, vol. 8, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
18
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec.
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
21
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
August
-
S. Drimer and S. J. Murdoch, "Keep your enemies close: Distance bounding against smartcard relay attacks," in USENIX Security Symposium, August 2007.
-
(2007)
USENIX Security Symposium
-
-
Drimer, S.1
Murdoch, S.J.2
-
22
-
-
77955225978
-
Reliability of chip & PIN evidence in banking disputes
-
Pario Communications, November
-
S. J. Murdoch, "Reliability of chip & PIN evidence in banking disputes," in Digital Evidence and Electronic Signature Law Review, vol. 6. Pario Communications, November 2009, pp. 98-115, ISBN 0-9543245-9-5.
-
(2009)
Digital Evidence and Electronic Signature Law Review
, vol.6
, pp. 98-115
-
-
Murdoch, S.J.1
|