Publisher
Springer International Publishing
Reference19 articles.
1. Battle, N.: Analysis separation without visitors. In: 15th Overture Workshop, Newcastle University (2017)
2. Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and Skim: cloning EMV cards with the pre-play attack. In: S&P, pp. 49–64. IEEE (2014)
3. Lecture Notes in Computer Science;J Dick,1993
4. Drimer, S., Murdoch, S.J., et al.: Keep your enemies close: distance bounding against smartcard relay attacks. In: USENIX Security Symposium, vol. 312 (2007)
5. Emms, M., Arief, B., Freitas, L., Hannon, J., van Moorsel, A.: Harvesting high value foreign currency transactions from EMV contactless credit cards without the pin. In: CCS, pp. 716–726. ACM (2014)