[PDF][PDF] EMV in a nutshell
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …
The EMV standard: Break, fix, verify
EMV is the international protocol standard for smartcard payment and is used in over 9
billion cards worldwide. Despite the standard's advertised security, various issues have …
billion cards worldwide. Despite the standard's advertised security, various issues have …
Consumer-facing technology fraud: Economics, attack methods and potential solutions
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
Context-based co-presence detection techniques: A survey
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …
detection techniques. These techniques are heavily used for improving security and usability …
Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions
Most EMV transactions require online authorization by the card issuer. Namely, the
merchant's payment terminal sends an authorization request to the card issuer over a …
merchant's payment terminal sends an authorization request to the card issuer over a …
Man-in-the-middle attack on contactless payment over NFC communications: design, implementation, experiments and detection
S Akter, S Chellappan, T Chakraborty… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A recent development emanating from RFID technology is Near Field Communication
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …
Relay cost bounding for contactless EMV payments
This paper looks at relay attacks against contactless payment cards, which could be used to
wirelessly pickpocket money from victims. We discuss the two leading contactless EMV …
wirelessly pickpocket money from victims. We discuss the two leading contactless EMV …
Practical EMV relay protection
Relay attackers can forward messages between a contactless EMV bank card and a shop
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …
Does the online card payment landscape unwittingly facilitate fraud?
An extensive study of the current practice of online payment using credit and debit cards
reveals the intrinsic security challenges caused by differences in how payment sites operate …
reveals the intrinsic security challenges caused by differences in how payment sites operate …
[PDF][PDF] Cryptographic protocols from physical assumptions
A Koch - 2019 - core.ac.uk
Modern cryptography does not only enable to protect your personal data on the Internet, or
to authenticate for certain services, but also evaluate a function on private inputs of multiple …
to authenticate for certain services, but also evaluate a function on private inputs of multiple …