-
2
-
-
84919353827
-
-
Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and skim: cloning emv cards with the pre-play attack. arXiv preprint arXiv:1209.2531 (2012)
-
(2012)
Chip and skim: Cloning emv cards with the pre-play attack. arXiv preprint arXiv
, vol.1209
, pp. 2531
-
-
Bond, M.1
Choudary, O.2
Murdoch, S.J.3
Skorobogatov, S.4
Anderson, R.5
-
3
-
-
84865812253
-
A birthday present every eleven wallets? the security of customer-chosen banking pins
-
In: Keromytis, A.D. (ed.), Springer, Heidelberg
-
Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? the security of customer-chosen banking pins. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 25–40. Springer, Heidelberg (2012)
-
(2012)
FC 2012. LNCS
, vol.7397
, pp. 25-40
-
-
Bonneau, J.1
Preibusch, S.2
Anderson, R.3
-
4
-
-
81155150177
-
Evaluation of a template protection approach to integrate fingerprint biometrics in a pin-based payment infrastructure
-
Breebaart, J., Buhan, I., de Groot, K., Kelkboom, E.: Evaluation of a template protection approach to integrate fingerprint biometrics in a pin-based payment infrastructure. Electronic Commerce Research and Applications 10(6), 605–614 (2011)
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.6
, pp. 605-614
-
-
Breebaart, J.1
Buhan, I.2
De Groot, K.3
Kelkboom, E.4
-
5
-
-
84873542701
-
Kernees: A protocol for mutual authentication between nfc phones and pos terminals for secure payment transactions
-
IEEE
-
Ceipidor, U.B., Medaglia, C.M., Marino, A., Sposato, S., Moroni, A.: Kernees: A protocol for mutual authentication between nfc phones and pos terminals for secure payment transactions. In: 9th International ISC Conference on Information Security and Cryptology (ISCISC), pp. 115–120. IEEE (2012)
-
(2012)
9th International ISC Conference on Information Security and Cryptology (ISCISC)
, pp. 115-120
-
-
Ceipidor, U.B.1
Medaglia, C.M.2
Marino, A.3
Sposato, S.4
Moroni, A.5
-
7
-
-
84919353826
-
The Dangers of Verify PIN on Contactless Cards
-
Newcastle University
-
Emms, M., Arief, B., Defty, T., Hannon, J., Hao, F., van Moorsel, A.: The Dangers of Verify PIN on Contactless Cards. Computing Science. Newcastle University (2012)
-
(2012)
Computing Science
-
-
Emms, M.1
Arief, B.2
Defty, T.3
Hannon, J.4
Hao, F.5
Van Moorsel, A.6
-
8
-
-
84919353825
-
Practical attack on contactless payment cards
-
Wealth and Identity Theft
-
Emms, M., van Moorsel, A.: Practical attack on contactless payment cards. In: HCI 2011 Health, Wealth and Identity Theft (2011)
-
(2011)
HCI 2011 Health
-
-
Emms, M.1
Van Moorsel, A.2
-
9
-
-
84919353824
-
-
EMVCo
-
EMV: Book A: Architecture and General Requirements. EMVCo (2013)
-
(2013)
-
-
-
10
-
-
84919353823
-
-
EMVCo
-
EMV: Book B: Entry Point. EMVCo (2013)
-
(2013)
-
-
-
11
-
-
84919353822
-
-
EMVCo
-
EMV: Book D: Contactless Communication Protocol. EMVCo (2013)
-
(2013)
-
-
-
13
-
-
84928998541
-
Extending emv payment smart cards with biometric on-card verification
-
Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.), Springer, Heidelberg
-
Henniger, O., Nikolov, D.: Extending emv payment smart cards with biometric on-card verification. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol. 396, pp. 121–130. Springer, Heidelberg (2013)
-
(2013)
IDMAN 2013. IFIP AICT
, vol.396
, pp. 121-130
-
-
Henniger, O.1
Nikolov, D.2
-
14
-
-
84919353821
-
Dont trust pos terminals! verify in-shop payments with your phone
-
Ion, I., Dragovic, B.: Dont trust pos terminals! verify in-shop payments with your phone. In: Proceedings of SMPU, vol. 8 (2010)
-
(2010)
Proceedings of SMPU
, vol.8
-
-
Ion, I.1
Dragovic, B.2
-
15
-
-
58149526709
-
Survey, nomenclature and comparison of reader anti-collision protocols in rfid
-
Joshi, G.P., Kim, S.W., et al.: Survey, nomenclature and comparison of reader anti-collision protocols in rfid. IETE Technical Review 25(5), 285 (2008)
-
(2008)
IETE Technical Review
, vol.25
, Issue.5
, pp. 285
-
-
Joshi, G.P.1
Kim, S.W.2
-
18
-
-
85084160910
-
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
-
USENIX Association, Berkeley
-
Mowery, K., Meiklejohn, S., Savage, S.: Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 6. USENIX Association, Berkeley (2011)
-
(2011)
Proceedings of the 5th USENIX Conference on Offensive Technologies
, pp. 6
-
-
Mowery, K.1
Meiklejohn, S.2
Savage, S.3
-
20
-
-
84942363028
-
-
Ogundele, O., Zavarsky, P., Ruhl, R., Lindskog, D.: Fraud reduction on emv payment cards by the implementation of stringent security features, pp. 252–262 (2012)
-
(2012)
Fraud reduction on emv payment cards by the implementation of stringent security features
, pp. 252-262
-
-
Ogundele, O.1
Zavarsky, P.2
Ruhl, R.3
Lindskog, D.4
-
21
-
-
84867174768
-
The implementation of a full emv smartcard for a point-of-sale transaction
-
IEEE
-
Ogundele, O., Zavarsky, P., Ruhl, R., Lindskog, D.: The implementation of a full emv smartcard for a point-of-sale transaction. In: 2012 World Congress on Internet Security (World- CIS), pp. 28–35. IEEE (2012)
-
(2012)
2012 World Congress on Internet Security (World- CIS)
, pp. 28-35
-
-
Ogundele, O.1
Zavarsky, P.2
Ruhl, R.3
Lindskog, D.4
-
22
-
-
84919353817
-
-
Springer, Heidelberg
-
S. Patrick, A., Yung, M. (eds.): FC 2005. LNCS, vol. 3570. Springer, Heidelberg (2005)
-
(2005)
FC 2005. LNCS
, vol.3570
-
-
Patrick, S.1
Yung, M.2
-
23
-
-
84919353816
-
-
accessed December 21
-
PCI: Payment Card Industry (PCI) Data Security Standard https://www.pcisecuritystandards.org/ (accessed December 21, 2013)
-
(2013)
-
-
-
25
-
-
34247167942
-
Design and evaluation of a shouldersurfing resistant graphical password scheme
-
ACM
-
Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shouldersurfing resistant graphical password scheme. In: Proceedings of the Working Conference on Advanced Visual Interfaces, pp. 177–184. ACM (2006)
-
(2006)
Proceedings of the Working Conference on Advanced Visual Interfaces
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.C.4
|