-
1
-
-
84919372166
-
-
Alhothaily A, Alrawais A, Cheng X, Bie R . In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. Lecture notes in computer science, vol 8491. Springer, pp 356–367
-
Alhothaily A, Alrawais A, Cheng X, Bie R (2014) Towards more secure cardholder verification in payment systems. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. Lecture notes in computer science, vol 8491. Springer, pp 356–367. doi:10.1007/978-3-319-07782-6_33
-
(2014)
Towards more secure cardholder verification in payment systems
, pp. 356-367
-
-
-
2
-
-
84942376616
-
-
Atkins S. Visa europe claims growth of 46 % in contactless payments in last three months
-
Atkins S. Visa europe claims growth of 46 % in contactless payments in last three months. http://contactlessintelligence.com/2013/05/21/visa-europe-claims-growth-of-46-in-contactless-payments-in-last-three-months-alone/
-
-
-
-
3
-
-
84914105014
-
Chip and skim: cloning emv cards with the pre-play attack
-
Bond M, Choudary O, Murdoch SJ, Skorobogatov S, Anderson R (2014) Chip and skim: cloning emv cards with the pre-play attack. In: 2014 IEEE symposium on security and privacy (SP), pp 49–64
-
(2014)
In: 2014 IEEE symposium on security and privacy (SP)
-
-
Bond, M.1
Choudary, O.2
Murdoch, S.J.3
Skorobogatov, S.4
Anderson, R.5
-
4
-
-
84865812253
-
A birthday present every eleven wallets?
-
Bonneau J, Preibusch S, Anderson R (2012) A birthday present every eleven wallets? The security of customer-chosen banking pins. In: Keromytis AD (ed) Financial cryptography and data security. Lecture notes in computer science, vol 7397. Springer, Heidelberg, pp 25–40. doi:10.1007/978-3-642-32946-3_3
-
(2012)
The security of customer-chosen banking pins. In: Keromytis AD (ed) Financial cryptography and data security. Lecture notes in computer science, vol 7397. Springer, Heidelberg
, pp. 25-40
-
-
Bonneau, J.1
Preibusch, S.2
Anderson, R.3
-
5
-
-
84976295016
-
Distance-bounding protocols
-
Brands S, Chaum D (1994) Distance-bounding protocols. In: Helleseth T (ed) Advances in cryptology–EUROCRYPT’93. Lecture notes in computer science, vol 765. Springer, Heidelberg, pp 344–359. doi:10.1007/3-540-48285-7_30
-
(1994)
In: Helleseth T (ed) Advances in cryptology–EUROCRYPT’93. Lecture notes in computer science, vol 765. Springer, Heidelberg, pp 344–359
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
6
-
-
81155150177
-
Evaluation of a template protection approach to integrate fingerprint biometrics in a pin-based payment infrastructure
-
Breebaart J, Buhan I, de Groot K, Kelkboom E (2011) Evaluation of a template protection approach to integrate fingerprint biometrics in a pin-based payment infrastructure. Electron Commer Res Appl 10(6):605–614
-
(2011)
Electron Commer Res Appl
, vol.10
, Issue.6
, pp. 605-614
-
-
Breebaart, J.1
Buhan, I.2
de Groot, K.3
Kelkboom, E.4
-
7
-
-
84873542701
-
Moroni A (2012) Kernees: a protocol for mutual authentication between nfc phones and pos terminals for secure payment transactions
-
ISCISC, IEEE
-
Ceipidor UB, Medaglia CM, Marino A, Sposato S, Moroni A (2012) Kernees: a protocol for mutual authentication between nfc phones and pos terminals for secure payment transactions. In: 2012 9th international ISC conference on information security and cryptology (ISCISC). IEEE, pp 115–120
-
2012 9th international ISC conference on information security and cryptology
, pp. 115-120
-
-
Ceipidor, U.B.1
Medaglia, C.M.2
Marino, A.3
Sposato, S.4
-
9
-
-
84880289702
-
Identification of pressed keys from mechanical vibrations
-
de Souza Faria G, Kim HY (2013) Identification of pressed keys from mechanical vibrations. IEEE Trans Inf Forensics Secur 8(7):1221
-
(2013)
IEEE Trans Inf Forensics Secur
, vol.8
, Issue.7
, pp. 1221
-
-
de Souza Faria, G.1
Kim, H.Y.2
-
10
-
-
84942376618
-
-
Discover zip
-
Discover zip. https://www.discover.com/credit-cards/help-center/account/zip/
-
-
-
-
11
-
-
85066944987
-
Keep your enemies close: distance bounding against smartcard relay attacks
-
Drimer S, Murdoch SJ (2007) Keep your enemies close: distance bounding against smartcard relay attacks. In: USENIX security symposium, pp 87–102
-
(2007)
In: USENIX security symposium
, pp. 87-102
-
-
Drimer, S.1
Murdoch, S.J.2
-
12
-
-
84942376619
-
-
Newcastle University, Newcastle upon Tyne
-
Emms M, Arief B, Defty T, Hannon J, Hao F, van Moorsel A (2012) The dangers of verify PIN on contactless cards, computing science. Newcastle University, Newcastle upon Tyne
-
(2012)
The dangers of verify PIN on contactless cards, computing science
-
-
Emms, M.1
Arief, B.2
Defty, T.3
Hannon, J.4
Hao, F.5
van Moorsel, A.6
-
13
-
-
84910614937
-
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
-
ACM SIGSAC conference on computer and communications security, ACM
-
Emms M, Arief B, Freitas L, Hannon J, van Moorsel A (2014) Harvesting high value foreign currency transactions from emv contactless credit cards without the pin. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, pp 716–726
-
(2014)
Proceedings of the 2014 ACM SIGSAC conference on computer and communications security
, vol.2014
, pp. 716-726
-
-
Emms, M.1
Arief, B.2
Freitas, L.3
Hannon, J.4
van Moorsel, A.5
-
14
-
-
85018145102
-
Practical attack on contactless payment cards. In: HCI2011 Workshop-Heath
-
Emms M, van Moorsel A (2011) Practical attack on contactless payment cards. In: HCI2011 Workshop-Heath, Wealth and Identity Theft
-
(2011)
Wealth and Identity Theft
-
-
Emms, M.1
van Moorsel, A.2
-
16
-
-
85018143739
-
Book B: entry point
-
EMV (2013) Book B: entry point. EMVCo
-
(2013)
EMVCo
-
-
-
17
-
-
85018144555
-
Book D: contactless communication protocol
-
EMV (2013) Book D: contactless communication protocol. EMVCo
-
(2013)
EMVCo
-
-
-
18
-
-
84942376624
-
-
Expresspay—American express
-
Expresspay—American express. http://www.americanexpress.com/expresspay
-
-
-
-
21
-
-
84928998541
-
Extending EMV payment smart cards with biometric on-card verification. In: Fischer-Hübner S, de Leeuw E, Mitchell C (eds) Policies and research in identity management
-
Henniger O, Nikolov D (2013) Extending EMV payment smart cards with biometric on-card verification. In: Fischer-Hübner S, de Leeuw E, Mitchell C (eds) Policies and research in identity management. IFIP advances in information and communication technology, vol 396. Springer, Heidelberg, pp 121–130. doi:10.1007/978-3-642-37282-7_12
-
(2013)
IFIP advances in information and communication technology, vol 396. Springer, Heidelberg
, pp. 121-130
-
-
Henniger, O.1
Nikolov, D.2
-
22
-
-
38549131714
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
Heydt-Benjamin TS, Bailey DV, Fu K, Juels A, O’hare T (2007) Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich S, Dhamija R (eds) Financial cryptography and data security. Lecture notes in computer science, vol 4886. Springer, Heidelberg, pp 2–14. doi:10.1007/978-3-540-77366-5_2
-
(2007)
In: Dietrich S, Dhamija R (eds) Financial cryptography and data security. Lecture notes in computer science
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O’hare, T.5
-
24
-
-
84919353821
-
Don’t trust pos terminals! verify in-shop payments with your phone
-
Ion I, Dragovic B (2010) Don’t trust pos terminals! verify in-shop payments with your phone. In: Proceedings of SMPU 8
-
(2010)
In: Proceedings of SMPU 8
-
-
Ion, I.1
Dragovic, B.2
-
25
-
-
58149526709
-
Survey, nomenclature and comparison of reader anti-collision protocols in rfid
-
Joshi GP, Kim SW et al (2008) Survey, nomenclature and comparison of reader anti-collision protocols in rfid. IETE Tech Rev 25(5):285
-
(2008)
IETE Tech Rev
, vol.25
, Issue.5
, pp. 285
-
-
Joshi, G.P.1
Kim, S.W.2
-
26
-
-
84942376627
-
-
King D Chip-and-PIN: success and challenges in reducing fraud
-
King D (2012) Chip-and-PIN: success and challenges in reducing fraud. https://www.frbatlanta.org/-/media/Documents/rprf/rprf_pubs/120111wp.pdf?la=en
-
(2012)
-
-
-
27
-
-
84942376628
-
-
Mastercard paypass
-
Mastercard paypass. http://www.mastercard.us/paypass.html
-
-
-
-
31
-
-
84942363028
-
Fraud reduction on emv payment cards by the implementation of stringent security features
-
Ogundele O, Zavarsky P, Ruhl R, Lindskog D (2012) Fraud reduction on emv payment cards by the implementation of stringent security features. Int J Intell Comput Res (IJICR) 3(1/2):252–262
-
(2012)
Int J Intell Comput Res (IJICR)
, vol.3
, Issue.1-2
, pp. 252-262
-
-
Ogundele, O.1
Zavarsky, P.2
Ruhl, R.3
Lindskog, D.4
-
32
-
-
84867174768
-
The implementation of a full emv smartcard for a point-of-sale transaction
-
World Congress on internet security (WorldCIS), IEEE
-
Ogundele O, Zavarsky P, Ruhl R, Lindskog D (2012) The implementation of a full emv smartcard for a point-of-sale transaction. In: 2012 World Congress on internet security (WorldCIS). IEEE, pp 28–35
-
(2012)
In
, vol.2012
, pp. 28-35
-
-
Ogundele, O.1
Zavarsky, P.2
Ruhl, R.3
Lindskog, D.4
-
33
-
-
85018145156
-
Financial cryptography and data security: 9th international conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28-March 3, 2005, Revised Papers, volume 3570
-
Patrick AS, Yung M (2005) Financial cryptography and data security: 9th international conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28-March 3, 2005, Revised Papers, volume 3570. Springer
-
(2005)
Springer
-
-
Patrick, A.S.1
Yung, M.2
-
34
-
-
84942376632
-
-
Payment card industry (pci) data security standard
-
Payment card industry (pci) data security standard. https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf
-
-
-
-
35
-
-
84942376633
-
-
Report: Contactless card payments current and forecast analysis to 2017—SecureIDNews
-
Report: Contactless card payments current and forecast analysis to 2017—SecureIDNews. http://secureidnews.com/news-item/report-contactless-card-payments-current-and-forecast-analysis-to-2017/
-
-
-
-
37
-
-
84919353815
-
Securing mobile payment protocol based on emv standard. Master’s thesis
-
Sifatullah Bhuiyan M (2012) Securing mobile payment protocol based on emv standard. Master’s thesis, KTH
-
(2012)
KTH
-
-
Sifatullah Bhuiyan, M.1
-
38
-
-
84942376634
-
-
Visa paywave
-
Visa paywave. http://usa.visa.com/personal/cards/card_technology/paywave.html
-
-
-
-
40
-
-
84942376635
-
-
Zalewski M (2005) Cracking safes with thermal imaging
-
Zalewski M (2005) Cracking safes with thermal imaging. http://lcamtuf.coredump.cx/tsafe/l
-
-
-
|