Author:
Sadeghi Somayeh,Chouhan Vikas,Aldarwbi Mohammed,Ghorbani Ali,Chow Aaron,Burko Robby
Reference32 articles.
1. On the security of the EMV authentication methods of contactless cards;O Al-Maliki;ECCWS 2020 19th European Conference on Cyber Warfare and Security,2020
2. Designed to be broken: a reverse engineering study of the 3D secure 2.0 payment protocol;M A Ali;Financial Cryptography and Data Security: 23rd International Conference,2019