Author:
Centenaro Matteo,Focardi Riccardo,Luccio Flaminia L.,Steel Graham
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Hackers crack cash machine PIN codes to steal millions, http://www.timesonline.co.uk/tol/money/consumer_affairs/article4259009.ece
2. PIN Crackers Nab Holy Grail of Bank Card Security. Wired Magazine Blog ’Threat Level’, http://blog.wired.com/27bstroke6/2009/04/pins.html
3. Abadi, M.: Secrecy by typing in security protocols. JACM 46(5), 749–786 (1999)
4. Lecture Notes in Computer Science;M. Abadi,2001
5. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). JCRYPTOL 15(2), 103–127 (2002)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Adversities in Abstract Interpretation - Accommodating Robustness by Abstract Interpretation;ACM Transactions on Programming Languages and Systems;2024-04-27
2. A Formally Verified Configuration for Hardware Security Modules in the Cloud;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
3. Secure Key Management Policies in Strand Spaces;Protocols, Strands, and Logic;2021
4. Run-Time Attack Detection in Cryptographic APIs;2017 IEEE 30th Computer Security Foundations Symposium (CSF);2017-08
5. Enhancing EMV Online PIN Verification;2015 IEEE Trustcom/BigDataSE/ISPA;2015-08