Secure Contactless Payment
暂无分享,去创建一个
[1] Gerhard P. Hancke,et al. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones , 2011, IACR Cryptol. ePrint Arch..
[2] Josef Langer,et al. Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless , 2013, WOOT.
[3] Rafail Ostrovsky,et al. Position-Based Cryptography , 2014, SIAM J. Comput..
[4] Serge Vaudenay,et al. Sound Proof of Proximity of Knowledge , 2015, ProvSec.
[5] Mike Bond,et al. Be Prepared: The EMV Preplay Attack , 2015, IEEE Security & Privacy.
[6] Sébastien Gambs,et al. A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol , 2016, WISEC.
[7] Serge Vaudenay. On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols , 2013, ProvSec.
[8] Serge Vaudenay,et al. Contactless Access Control Based on Distance Bounding , 2017, ISC.
[9] Srdjan Capkun,et al. Distance Hijacking Attacks on Distance Bounding Protocols , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[11] Serge Vaudenay,et al. Efficient Public-Key Distance Bounding Protocol , 2016, ASIACRYPT.
[12] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[13] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[14] Serge Vaudenay,et al. Secure and Lightweight Distance-Bounding , 2013, LightSec.
[15] Tom Chothia,et al. Relay Cost Bounding for Contactless EMV Payments , 2015, Financial Cryptography.
[16] Mike Bond,et al. Chip and Skim: Cloning EMV Cards with the Pre-play Attack , 2012, 2014 IEEE Symposium on Security and Privacy.
[17] Sébastien Gambs,et al. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol , 2017, IACR Cryptol. ePrint Arch..
[18] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[19] Serge Vaudenay,et al. Optimal Proximity Proofs , 2014, Inscrypt.
[20] Serge Vaudenay,et al. On Privacy for RFID , 2015, ProvSec.
[21] Gerhard P. Hancke,et al. Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.
[22] Serge Vaudenay. Private and Secure Public-Key Distance Bounding - Application to NFC Payment , 2015, Financial Cryptography.