Author:
Al-Maliki Ossama,Al-Assam Hisham
Subject
Law,General Computer Science
Reference30 articles.
1. An integrated development environment for Java Card;Attali;Computer Networks,2001
2. Bond, M. et al. (2014) ‘Chip and skim: Cloning EMV cards with the pre-play attack’, in Proceedings - IEEE Symposium on Security and Privacy. doi:10.1109/SP.2014.11.
3. Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices;Van den Breekel,2015
4. EMV in a nutshell;Van den Breekel,2016
5. Ceipidor, U. B. et al. (2012) ‘A protocol for mutual authentication between NFC phones and POS terminals for secure’, pp. 115–120.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献