Practical attack on contactless payment cards, Wealth and Identity Theft, 2011. ,
Hacking the nfc credit cards for fun and debit, Hackito Ergo Sum conference, 2012. ,
Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, pp.433-446, 2010. ,
DOI : 10.1109/SP.2010.33
The transport layer security (tls) protocol version 1.2, 2008. ,
DOI : 10.17487/rfc5246
The prevention of cheque and credit card fraud, 1991. ,
La norme emv, 2009. ,
An online security protocol for NFC payment: Formally analyzed by the scyther tool, 2016 Second International Conference on Mobile and Secure Services (MobiSecServ), pp.1-7, 2016. ,
DOI : 10.1109/MOBISECSERV.2016.7440225
URL : https://hal.archives-ouvertes.fr/hal-01276921
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Comparing state spaces in automatic protocol verification, International Workshop on Automated Verification of Critical Systems (AVoCS), 2007. ,
Operational semantics and verification of security protocols, 2012. ,
DOI : 10.1007/978-3-540-78636-8
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997. ,
DOI : 10.1109/CSFW.1997.596782
KerNeeS: A protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions, 2012 9th International ISC Conference on Information Security and Cryptology, 2012. ,
DOI : 10.1109/ISCISC.2012.6408203
A cloud-based secure authentication protocol for contactless-NFC payment, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), pp.328-330, 2015. ,
DOI : 10.1109/CloudNet.2015.7335332
URL : https://hal.archives-ouvertes.fr/hal-01247236