-
1
-
-
38549179234
-
Position statement in RFID S&P panel: RFID and the middleman
-
Springer Berlin Heidelberg
-
Anderson, R. Position Statement in RFID S&P Panel: RFID and the Middleman. In Financial Cryptography and Data Security, vol. 4886/2007 of LNCS. Springer Berlin Heidelberg, 2007, pp. 46–49.
-
(2007)
Financial Cryptography and Data Security, Vol. 4886/2007 of LNCS
, pp. 46-49
-
-
Anderson, R.1
-
2
-
-
84995356490
-
Chip and skim: Cloning EMV cards with the pre-play attack
-
Sept
-
Bond, M., Choudary, O., Murdoch, S. J., Skorobogatov, S., and Anderson, R. Chip and Skim: cloning EMV cards with the pre-play attack. Computing Research Repository (CoRR), arXiv:1209.2531 [cs.CY], Sept. 2012.
-
(2012)
Computing Research Repository (CoRR)
-
-
Bond, M.1
Choudary, O.2
Murdoch, S.J.3
Skorobogatov, S.4
Anderson, R.5
-
4
-
-
14844315858
-
Card-O-Rama: Magnetic stripe technology and beyond
-
Nov
-
Count Zero. Card-O-Rama: Magnetic Stripe Technology and Beyond. In Phrack, vol. 37. Nov. 1992.
-
(1992)
Phrack
, vol.37
-
-
Zero, C.1
-
5
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol (extended abstract)
-
Springer Berlin Heidelberg
-
Desmedt, Y., Goutier, C., and Bengio, S. Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract). In Advances in Cryptology — CRYPTO’87, vol. 293/2006 of LNCS. Springer Berlin Heidelberg, 1988, pp. 21–39.
-
(1988)
Advances in Cryptology — CRYPTO’87, Vol. 293/2006 of LNCS
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
6
-
-
85080498471
-
Magneetkaarten
-
Dr
-
Dr. Mabuse. Magneetkaarten. In Hack-Tic, vol. 8. 1990.
-
(1990)
Hack-Tic
, vol.8
-
-
Mabuse1
-
7
-
-
85080622364
-
Magneetkaarten deel II
-
Dr
-
Dr. Mabuse. Magneetkaarten deel II. In Hack-Tic, vol. 9/10. 1990.
-
(1990)
Hack-Tic
, vol.9
, Issue.10
-
-
Mabuse1
-
10
-
-
77950332270
-
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms
-
IEEE, London, UK, Nov
-
Francis, L., Hancke, G. P., Mayes, K. E., and Markantonakis, K. Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. In Proceedings of the 1st International Workshop on RFID Security and Cryptography (RISC’09). IEEE, London, UK, Nov. 2009.
-
(2009)
Proceedings of the 1st International Workshop on RFID Security and Cryptography (RISC’09)
-
-
Francis, L.1
Hancke, G.P.2
Mayes, K.E.3
Markantonakis, K.4
-
11
-
-
84860689367
-
On the security issues of NFC enabled mobile phones
-
Francis, L., Hancke, G. P., Mayes, K. E., and Markantonakis, K. On the security issues of NFC enabled mobile phones. In Int. J. Internet Technology and Secured Transactions, vol. 2(3/4). 2010, pp. 336–356.
-
(2010)
Int. J. Internet Technology and Secured Transactions
, vol.2
, Issue.3-4
, pp. 336-356
-
-
Francis, L.1
Hancke, G.P.2
Mayes, K.E.3
Markantonakis, K.4
-
12
-
-
78650216365
-
Practical NFC peer-to-peer relay attack using mobile phones
-
Springer Berlin Heidelberg
-
Francis, L., Hancke, G. P., Mayes, K. E., and Markantonakis, K. Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. In Radio Frequency Identification: Security and Privacy Issues, vol. 6370/2010 of LNCS. Springer Berlin Heidelberg, 2010, pp. 35–49.
-
(2010)
Radio Frequency Identification: Security and Privacy Issues, Vol. 6370/2010 of LNCS
, pp. 35-49
-
-
Francis, L.1
Hancke, G.P.2
Mayes, K.E.3
Markantonakis, K.4
-
13
-
-
84888152161
-
Practical relay attack on contactless transactions by using NFC mobile phones
-
Report 2011/618
-
Francis, L., Hancke, G. P., Mayes, K. E., and Markantonakis, K. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. Cryptology ePrint Archive, Report 2011/618, 2011.
-
(2011)
Cryptology ePrint Archive
-
-
Francis, L.1
Hancke, G.P.2
Mayes, K.E.3
Markantonakis, K.4
-
14
-
-
85080560201
-
Automated robbery: How card skimmers (still) steal millions from banks
-
June
-
Gallagher, S. Automated robbery: how card skimmers (still) steal millions from banks. Ars Technica (June 2012). http://arstechnica.com/security/2012/06/automated-robbery-how-card-skimmers-still-steal-millions-from-banks/.
-
(2012)
Ars Technica
-
-
Gallagher, S.1
-
17
-
-
38549131714
-
Vulnerabilities in First-Generation RFID-enabled credit cards
-
Springer Berlin Heidelberg
-
Heydt-Benjamin, T. S., Bailey, D. V., Fu, K., Juels, A., and O’Hare, T. Vulnerabilities in First-Generation RFID-enabled Credit Cards. In Financial Cryptography and Data Security, vol. 4886/2007 of LNCS. Springer Berlin Heidelberg, 2007, pp. 2–14.
-
(2007)
Financial Cryptography and Data Security, Vol. 4886/2007 of LNCS
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O’Hare, T.5
-
18
-
-
85080596632
-
Overseas credit card scam exposed
-
Mar
-
Little, A. Overseas credit card scam exposed. BBC News (Mar. 2009). http://news.bbc.co.uk/2/hi/uk_news/7953401.stm.
-
(2009)
BBC News
-
-
Little, A.1
-
19
-
-
84921038966
-
-
MasterCard Worldwide. July
-
MasterCard Worldwide. MasterCard Rules, July 2011.
-
(2011)
MasterCard Rules
-
-
-
21
-
-
77955217681
-
Chip and pin is broken
-
IEEE, Oakland, CA, USA, May
-
Murdoch, S. J., Drimer, S., Anderson, R., and Bond, M. Chip and PIN is Broken. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE, Oakland, CA, USA, May 2010, pp. 433–446.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy (S&P)
, pp. 433-446
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
22
-
-
85034042531
-
Credit card fraud – The contactless generation
-
Paget, K. Credit Card Fraud – The Contactless Generation. Presentation at ShmooCon 2012, 2012. http://www.shmoocon.org/2012/presentations/Paget_shmoocon2012-credit-cards.pdf.
-
(2012)
ShmooCon 2012
-
-
Paget, K.1
-
23
-
-
84977869841
-
Applying recent secure element relay attack scenarios to the real world: Google wallet relay attack
-
Sept
-
Roland, M. Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack. Computing Research Repository (CoRR), arXiv:1209.0875 [cs.CR], Sept. 2012.
-
(2012)
Computing Research Repository (CoRR)
-
-
Roland, M.1
-
24
-
-
84890857710
-
-
PhD thesis, Johannes Kepler University Linz, Department of Computational Perception, Jan
-
Roland, M. Security Issues in Mobile NFC Devices. PhD thesis, Johannes Kepler University Linz, Department of Computational Perception, Jan. 2013.
-
(2013)
Security Issues in Mobile NFC Devices
-
-
Roland, M.1
-
25
-
-
84876148959
-
Applying relay attacks to google wallet
-
IEEE, Zurich, Switzerland, Feb
-
Roland, M., Langer, J., and Scharinger, J. Applying Relay Attacks to Google Wallet. In Proceedings of the Fifth International Workshop on Near Field Communication (NFC 2013). IEEE, Zurich, Switzerland, Feb. 2013.
-
(2013)
Proceedings of the Fifth International Workshop on near Field Communication (NFC 2013)
-
-
Roland, M.1
Langer, J.2
Scharinger, J.3
-
26
-
-
84861740551
-
The long life and imminent death of the mag-stripe card
-
June
-
Svigals, J. The Long Life and Imminent Death of the Mag-Stripe Card. In IEEE Spectrum, vol. 49(6). June 2012.
-
(2012)
IEEE Spectrum
, vol.49
, Issue.6
-
-
Svigals, J.1
|