-
1
-
-
4043049419
-
-
2nd ed. New York, NY, USA: John Wiley &Sons, Inc
-
K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. New York, NY, USA: John Wiley &Sons, Inc., 2003.
-
(2003)
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
-
-
Finkenzeller, K.1
-
3
-
-
44149083053
-
The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application
-
Y. Au and R. Kauffman, "The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application," Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 141-164, 2008.
-
(2008)
Electronic Commerce Research and Applications
, vol.7
, Issue.2
, pp. 141-164
-
-
Au, Y.1
Kauffman, R.2
-
4
-
-
58049135005
-
SecureSMSPay: Secure sms mobile payment model
-
Aug
-
H. Harb, H. Farahat, and M. Ezz, "SecureSMSPay: Secure SMS mobile payment model," in Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference on, Aug 2008, pp. 11-17.
-
(2008)
Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference on
, pp. 11-17
-
-
Harb, H.1
Farahat, H.2
Ezz, M.3
-
5
-
-
24744442135
-
Bluetooth as an enabling technology in mobile transactions
-
April
-
S. Pradhan, E. Lawrence, and A. Zmijewska, "Bluetooth as an enabling technology in mobile transactions," in Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on, vol. 2, April 2005, pp. 53-58 Vol. 2.
-
(2005)
Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on
, vol.2
, pp. 53-58
-
-
Pradhan, S.1
Lawrence, E.2
Zmijewska, A.3
-
6
-
-
70449338850
-
Secure mobile payment system in wireless environment
-
April
-
S. Manvi, L. Bhajantri, and M. Vijayakumar, "Secure mobile payment system in wireless environment," in Future Computer and Communication, 2009. ICFCC 2009. International Conference on, April 2009, pp. 31-35.
-
(2009)
Future Computer and Communication, 2009. ICFCC 2009. International Conference on
, pp. 31-35
-
-
Manvi, S.1
Bhajantri, L.2
Vijayakumar, M.3
-
8
-
-
80052121140
-
Nfc mobile payment with citizen digital certificate
-
June
-
W.-D. Chen, M. Keith, Y.-H. Lien, and J.-H. Chiu, "Nfc mobile payment with citizen digital certificate," in Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on, June 2011, pp. 120-126.
-
(2011)
Next Generation Information Technology (ICNIT), 2011 the 2nd International Conference on
, pp. 120-126
-
-
Chen, W.-D.1
Keith, M.2
Lien, Y.-H.3
Chiu, J.-H.4
-
9
-
-
84876148959
-
Applying relay attacks to google wallet
-
M. Roland, J. Langer, and J. Scharinger, "Applying relay attacks to Google Wallet," in Near Field Communication (NFC), 2013 5th International Workshop on. IEEE, 2013, pp. 1-6.
-
(2013)
Near Field Communication (NFC), 2013 5th International Workshop On. IEEE
, pp. 1-6
-
-
Roland, M.1
Langer, J.2
Scharinger, J.3
-
13
-
-
77955217681
-
Chip and pin is broken
-
S. Murdoch, S. Drimer, R. Anderson, and M. Bond, "Chip and PIN is broken," in IEEE Symposium on Security and Privacy, 2010, pp. 433-446.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 433-446
-
-
Murdoch, S.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
14
-
-
84923004605
-
Chip &pin is definitely broken
-
A. Barisani, D. Bianco, A. Laurie, and Z. Franken, "Chip &PIN is definitely broken," in Presentation at CanSecWest Applied Security Conference, Vancouver, 2011.
-
(2011)
Presentation at CanSecWest Applied Security Conference, Vancouver
-
-
Barisani, A.1
Bianco, D.2
Laurie, A.3
Franken, Z.4
-
15
-
-
84995356490
-
Chip and skim: Cloning emv cards with the pre-play attack
-
abs/1209.2531
-
M. Bond, O. Choudary, S. Murdoch, S. Skorobogatov, and R. Anderson, "Chip and skim: cloning EMV cards with the pre-play attack," CoRR, vol. abs/1209.2531, 2012.
-
(2012)
CoRR
-
-
Bond, M.1
Choudary, O.2
Murdoch, S.3
Skorobogatov, S.4
Anderson, R.5
-
17
-
-
77950332270
-
Potential misuse of nfc enabled mobile phones with embedded security elements as contactless attack platforms
-
L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, "Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms," in ICITST, 2009, pp. 1-8.
-
(2009)
ICITST
, pp. 1-8
-
-
Francis, L.1
Hancke, G.2
Mayes, K.3
Markantonakis, K.4
-
18
-
-
78650216365
-
Practical nfc peer-to-peer relay attack using mobile phones
-
ser. Lecture Notes in Computer Science, S. Ors Yalcin, Ed. Springer Berlin Heidelberg
-
L. Francis, K. Mayes, G. Hancke, and K. Markantonakis, "Practical NFC peer-to-peer relay attack using mobile phones," in Radio Frequency Identification: Security and Privacy Issues, ser. Lecture Notes in Computer Science, S. Ors Yalcin, Ed. Springer Berlin Heidelberg, 2010, vol. 6370, pp. 35-49. [Online]. Available: http: //dx.doi.org/10.1007/978-3-642-16822-2 4
-
(2010)
Radio Frequency Identification: Security and Privacy Issues
, vol.6370
, pp. 35-49
-
-
Francis, L.1
Mayes, K.2
Hancke, G.3
Markantonakis, K.4
-
19
-
-
84923004603
-
-
Identification Cards Integrated Circuit Cards, International Standard Organization / International Electrotechnical Commission Std Std., 2005
-
Identification Cards Integrated Circuit Cards, International Standard Organization / International Electrotechnical Commission Std Std., 2005.
-
-
-
-
22
-
-
84901458271
-
Have money, will travel: A brief survey of the mobile payments landscape
-
University of Ottawa, Tech. Rep., June
-
C. Adams, "Have money, will travel: A brief survey of the mobile payments landscape," School of Electrical Engineering and Computer Science, University of Ottawa, Tech. Rep., June 2013.
-
(2013)
School of Electrical Engineering and Computer Science
-
-
Adams, C.1
-
23
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe, "Casper: A compiler for the analysis of security protocols," in Computer Security Foundations Workshop, 1997. Proceedings., 10th. IEEE, 1997, pp. 18-30
-
(1997)
Computer Security Foundations Workshop, 1997. Proceedings., 10th. IEEE
, pp. 18-30
-
-
Lowe, G.1
|