Combinational logic soft error correction

S Mitra, M Zhang, S Waqas, N Seifert… - 2006 IEEE …, 2006 - ieeexplore.ieee.org
We present two techniques for correcting radiation-induced soft errors in combinational logic-
error correction using duplication, and error correction using time-shifted outputs. Simulation …

A secure end-to-end proximity NFC-based mobile payment protocol

S Bojjagani, VN Sastry - Computer Standards & Interfaces, 2019 - Elsevier
Abstract Near Field Communication (NFC) is one of the fast-growing technologies related to
proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that …

Challenge-response mutual authentication protocol for EMV contactless cards

O Al-Maliki, H Al-Assam - Computers & Security, 2021 - Elsevier
Abstract Europay MasterCard and Visa (EMV) is the most popular payment protocol with
almost 7.1 billion EMV based credit and debit cards around the world. This payment protocol …

Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool

N El Madhoun, E Bertin, M Badra, G Pujolle - Annals of …, 2021 - Springer
EMV is the protocol implemented to secure the communication, between a client's payment
device and a merchant's payment device, during a contact or an NFC purchase transaction …

The EMV Payment System: Is It Reliable?

N El Madhoun, E Bertin… - 2019 3rd Cyber Security in …, 2019 - ieeexplore.ieee.org
EMV (Europay MasterCard Visa) is the technical international protocol implemented to
secure the communication, between a client's payment device and a PoS (Point of Sale) …

I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics

S Seiden, I Baggili, A Ali-Gombe - … on Digital Forensics and Cyber Crime, 2023 - Springer
Recently, people have become interested in embedding technology in their bodies to
augment themselves with new abilities. For example, a person may embed a chip in their …

Enhanced and secured random number generation for eUASBP

S Rajaram, S Vollala, N Ramasubramanian… - International Journal of …, 2022 - Springer
Authentication is needed for vital applications around the world. Applications that deal with
sensitive information need to be kept secret through anyone type of authentication mode …

Impact of Internal Control, Cybersecurity Risk, and Competitive Advantage on Retail Cybersecurity Budget

S Pfanstiel - 2022 - search.proquest.com
Retail organizations are driven to improve security posture for many reasons, including
meeting financial regulation requirements, mitigating threats of data breach, and …

FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS.

SJ Ibrahima, AB Al-Khalil - Science Journal of University of …, 2023 - search.ebscohost.com
The contactless bank card is a replica of the old fashion payment methods. The contactless
card saves the customer a lot of time and effort because the cardholder can tap the card on …

FINGERPRINTS TO AUTHENTICATE TRANSACTIONS IN CONTACTLESS CARDS

AB Al-Khalil - Science Journal of University of Zakho, 2023 - sjuoz.uoz.edu.krd
The contactless bank card is a replica of the old fashion payment methods. The contactless
card saves the customer a lot of time and effort because the cardholder can tap the card on …