1 |
EMVCo, "EMV - Integrated Circuit Card specifications for payment systems," ver. 4.2, 2008. Article (CrossRef Link)
|
2 |
R. Anderson and S. J. Murdoch, “EMV: Why payment systems fail,” Communications of the ACM, vol. 57, no. 6, pp. 24-28, June 2014. Article (CrossRef Link)
DOI
|
3 |
M. Bond, M. O. Choudary, S. J. Murdoch, S. Skorobogatov and R. Anderson, "Be Prepared: The EMV Preplay Attack," IEEE Security & Privacy, vol.13, no. 2, pp. 56-64, Mar.-Apr. 2015. Article (CrossRef Link)
DOI
|
4 |
M. Bond, O. Choudary, S. J. Murdoch, S. Skorobogatov and R. Anderson, "Chip and Skim: Cloning EMV Cards with the Pre-play Attack," in Proc. of 2014 IEEE Symposium on Security and Privacy, pp. 49-64, May 2014. Article (CrossRef Link)
|
5 |
S. J. Murdoch and R. Anderson, "Security protocols and evidence: Where many payment systems fail," Financial Cryptography and Data Security, LNCS 8437, pp. 21-32, Mar. 2014. Article (CrossRef Link)
|
6 |
Mastercard and Visa, "SET: Secure Electronic Transaction specification," ver. 1.0, 1997.
|
7 |
Visa International Service Association, "3-D Secure protocol specification: core functions," ver. 1.0.2, July 2002.
|
8 |
M. Assora and A. Shirvani, "Enhancing the security and efficiency of 3-D Secure," Information Security, LNCS, vol. 4176, pp. 489-501, 2006. Article (CrossRef Link)
|
9 |
S. J. Murdoch and R. Anderson, "Verified by Visa and Master Card Secure Code: or, How not to design authentication," Financial Cryptography, LNCS, vol. 6052, pp. 336-342, 2010. Article (CrossRef Link)
|
10 |
G. Wallace, J. Pepitone, J. O’Toole, C. Isidore, J. Pagliery and J. Johns, “Target: 40 million credit cards compromised,” CNN Money, Dec. 19. 2013.
|
11 |
PCI Security Standard Council, "Information Supplement: PCI DSS Tokenization Guidelines," PCI Data Security Standard, 2011. Article (CrossRef Link)
|
12 |
Y. Li and X. Zhang, “Securing credit card transactions with one-time payment scheme,” Electronic Commerce Research and Applications, vol. 4, pp. 413-426, 2005. Article (CrossRef Link)
DOI
|
13 |
I. Molloy, J. Li and N. Li, "Dynamic virtual credit card numbers," Financial Cryptography and Data Security, LNCS, vol. 4886, pp 208-223, 2007. Article (CrossRef Link)
|
14 |
F. Buccafurri and G. Lax, "A light number-generation scheme for feasible and secure credit-card-payment solutions," E-Commerce and Web Technologies, LNCS, vol. 5183, pp 11-20, 2008. Article (CrossRef Link)
|
15 |
F. Javani and S. Mohammadi, “A new credit card payment system based on 3D-Secure using one-time-use transaction numbers,” Information Assurance and Security Letters, vol. 1, pp. 60-65, 2010. Article (CrossRef Link)
|
16 |
A. Shamir, "SecureClick: A Web payment system with disposable credit card numbers," Financial Cryptography, LNCS, vol. 2339, pp. 196-209, 2002. Article (CrossRef Link)
|
17 |
T. Aura, "Cryptographically Generated Addresses (CGA)", RFC 3972, Mar. 2005 Article (CrossRef Link)
|