Risks of Offline Verify PIN on Contactless Cards (Englisch)
- Neue Suche nach: Emms, Martin
- Neue Suche nach: Arief, Budi
- Neue Suche nach: Little, Nicholas
- Neue Suche nach: Moorsel, Aad
- Neue Suche nach: Emms, Martin
- Neue Suche nach: Arief, Budi
- Neue Suche nach: Little, Nicholas
- Neue Suche nach: Moorsel, Aad
In:
Financial Cryptography and Data Security
11
;
313-321
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Risks of Offline Verify PIN on Contactless Cards
-
Beteiligte:Emms, Martin ( Autor:in ) / Arief, Budi ( Autor:in ) / Little, Nicholas ( Autor:in ) / Moorsel, Aad ( Autor:in )
-
Erschienen in:Financial Cryptography and Data Security , 11 ; 313-321Lecture Notes in Computer Science ; 7859, 11 ; 313-321
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Can Nature Help Us Solve Risk Management Issues?Saito, William H. et al. | 2013
- 6
-
Quantitative Analysis of the Full Bitcoin Transaction GraphRon, Dorit / Shamir, Adi et al. | 2013
- 25
-
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange RiskMoore, Tyler / Christin, Nicolas et al. | 2013
- 34
-
Evaluating User Privacy in BitcoinAndroulaki, Elli / Karame, Ghassan O. / Roeschlin, Marc / Scherer, Tobias / Capkun, Srdjan et al. | 2013
- 52
-
The Importance of Being Earnest [In Security Warnings]Egelman, Serge / Schechter, Stuart et al. | 2013
- 60
-
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device PairingGallego, Alexander / Saxena, Nitesh / Voris, Jonathan et al. | 2013
- 69
-
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity AuthenticationKim, Tiffany Hyun-Jin / Yamada, Akira / Gligor, Virgil / Hong, Jason / Perrig, Adrian et al. | 2013
- 78
-
Practical Fully Simulatable Oblivious Transfer with Sublinear CommunicationZhang, Bingsheng / Lipmaa, Helger / Wang, Cong / Ren, Kui et al. | 2013
- 96
-
Unconditionally-Secure Robust Secret Sharing with Minimum Share SizeJhanwar, Mahabir Prasad / Safavi-Naini, Reihaneh et al. | 2013
- 111
-
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series DataJoye, Marc / Libert, Benoît et al. | 2013
- 126
-
“Give Me Letters 2, 3 and 6!”: Partial Password Implementations and AttacksAspinall, David / Just, Mike et al. | 2013
- 144
-
Hey, You, Get Off of My ClipboardFahl, Sascha / Harbach, Marian / Oltrogge, Marten / Muders, Thomas / Smith, Matthew et al. | 2013
- 162
-
Unique Ring Signatures: A Practical ConstructionFranklin, Matthew / Zhang, Haibin et al. | 2013
- 171
-
Aggregating CL-Signatures Revisited: Extended Functionality and Better EfficiencyLee, Kwangsu / Lee, Dong Hoon / Yung, Moti et al. | 2013
- 189
-
Accumulators and U-Prove RevocationAcar, Tolga / Chow, Sherman S. M. / Nguyen, Lan et al. | 2013
- 197
-
Towards a Publicly-Verifiable Mix-Net Providing Everlasting PrivacyBuchmann, Johannes / Demirel, Denise / Graaf, Jeroen et al. | 2013
- 205
-
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation SystemsRupp, Andy / Hinterwälder, Gesine / Baldimtsi, Foteini / Paar, Christof et al. | 2013
- 213
-
Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault InjectionsSasaki, Yu / Li, Yang / Sakamoto, Hikaru / Sakiyama, Kazuo et al. | 2013
- 221
-
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility StudyMaebe, Jonas / Keulenaer, Ronald / Sutter, Bjorn / Bosschere, Koen et al. | 2013
- 230
-
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM CardsZhou, Yuanyuan / Yu, Yu / Standaert, François-Xavier / Quisquater, Jean-Jacques et al. | 2013
- 239
-
Securely Solving Simple Combinatorial Graph ProblemsAly, Abdelrahaman / Cuvelier, Edouard / Mawet, Sophie / Pereira, Olivier / Vyve, Mathieu et al. | 2013
- 258
-
Parallel and Dynamic Searchable Symmetric EncryptionKamara, Seny / Papamanthou, Charalampos et al. | 2013
- 275
-
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth CircuitsSchneider, Thomas / Zohner, Michael et al. | 2013
- 293
-
The Untapped Potential of Trusted Execution Environments on Mobile DevicesAsokan, N. / Ekberg, Jan-Erik / Kostiainen, Kari et al. | 2013
- 295
-
StarkMüller, Tilo / Spath, Hans / Mäckl, Richard / Freiling, Felix C. et al. | 2013
- 313
-
Risks of Offline Verify PIN on Contactless CardsEmms, Martin / Arief, Budi / Little, Nicholas / Moorsel, Aad et al. | 2013
- 322
-
How to Attack Two-Factor Authentication Internet BankingAdham, Manal / Azodi, Amir / Desmedt, Yvo / Karaolis, Ioannis et al. | 2013
- 329
-
CAge: Taming Certificate Authorities by Inferring Restricted ScopesKasten, James / Wustrow, Eric / Halderman, J. Alex et al. | 2013
- 338
-
Interdependent Privacy: Let Me Share Your DataBiczók, Gergely / Chia, Pern Hui et al. | 2013
- 354
-
A Secure Submission System for Online Whistleblowing PlatformsRoth, Volker / Güldenring, Benjamin / Rieffel, Eleanor / Dietrich, Sven / Ries, Lars et al. | 2013
- 362
-
Securing Anonymous Communication Channels under the Selective DoS AttackDas, Anupam / Borisov, Nikita et al. | 2013
- 371
-
PIRMAP: Efficient Private Information Retrieval for MapReduceMayberry, Travis / Blass, Erik-Oliver / Chan, Agnes Hui et al. | 2013
- 386
-
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security UpdatesCappos, Justin et al. | 2013
- 395
-
Three-Factor User Authentication Method Using Biometrics Challenge ResponseFujii, Haruhiko / Tsuruoka, Yukio et al. | 2013
- 397
-
Synthetic Logs Generator for Fraud Detection in Mobile Transfer ServicesGaber, Chrystel / Hemery, B. / Achemlal, Mohammed / Pasquet, M. / Urien, P. et al. | 2013
- 399
-
Onions for Sale: Putting Privacy on the MarketJohnson, Aaron / Jansen, Rob / Syverson, Paul et al. | 2013
- 401
-
Searchable Encryption Supporting General Boolean Expression QueriesMoataz, Tarik / Shikfa, Abdullatif et al. | 2013
- 402
-
A Privacy Preserving E-Payment ArchitecturePlateaux, Aude / Coquet, Vincent / Vernois, Sylvain / Lacharme, Patrick / Murty, Kumar / Rosenberger, Christophe et al. | 2013
- 403
-
Communication Services Empowered with a Classical Chaos Based CryptosystemVidal, Gerard / Hernaez, Mikel et al. | 2013