A hole in the security wall: ATM hacking

Attacks on Automated Teller Machines (ATMs) are increasing in both volume and sophistication. Alain Job is not a happy man. The former Halifax bank customer lost his case against the company in the UK's Nottingham County Court last year, ending a three year-long battle after he claimed that phantom withdrawals were made on his chip and PIN-enabled card.

[1]  Jeff Boleng,et al.  Designing web labs for teaching security concepts , 2009 .

[2]  B. Brown 802.11: the security differences between b and i , 2003 .

[3]  Bruce Schneier,et al.  Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor , 1997, FSE.

[4]  Wail S. Elkilani,et al.  Performance of encryption techniques for real time video streaming , 2009, 2009 International Conference on Networking and Media Convergence.

[5]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[6]  Juan E. Tapiador,et al.  Automated design of a lightweight block cipher with Genetic Programming , 2008, Int. J. Knowl. Based Intell. Eng. Syst..

[7]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[8]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[9]  Bruce Schneier,et al.  Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.

[10]  Bruce Schneier,et al.  Cryptography, security, and the future , 1999 .

[11]  Bruce Schneier,et al.  Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.

[12]  Boris Skoric,et al.  Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions , 2009, Inf. Syst. Frontiers.