{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:36:04Z","timestamp":1761762964980},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398834"},{"type":"electronic","value":"9783642398841"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39884-1_26","type":"book-chapter","created":{"date-parts":[[2013,8,5]],"date-time":"2013-08-05T01:02:52Z","timestamp":1375664572000},"page":"313-321","source":"Crossref","is-referenced-by-count":14,"title":["Risks of Offline Verify PIN on Contactless Cards"],"prefix":"10.1007","author":[{"given":"Martin","family":"Emms","sequence":"first","affiliation":[]},{"given":"Budi","family":"Arief","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Little","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Advanced Card Systems: ACR122U NFC Reader Application Programming Interface (2011), \n                    \n                      http:\/\/www.acs.com.hk\/drivers\/eng\/API_ACR122U_v2.00.pdf\n                    \n                    \n                   (accessed January 29, 2013)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-32946-3_3","volume-title":"Financial Cryptography and Data Security","author":"J. Bonneau","year":"2012","unstructured":"Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? The security of customer-chosen banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 25\u201340. Springer, Heidelberg (2012)"},{"key":"26_CR3","unstructured":"Choudary, O.S.: The Smart Card Detective: a hand-held EMV interceptor, Cambridge (2010)"},{"key":"26_CR4","unstructured":"Drimer, S., Murdoch, S.: Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. In: USENIX Security Symposium (2006)"},{"key":"26_CR5","unstructured":"EMVCo. EMV Specifications for Payment Systems, Books 1,2,3 and 4, Version 4.3 (2011)"},{"key":"26_CR6","unstructured":"EMVCo. EMV Contactless Specifications for Payment Systems, Books A,B,C-1,C-2,C-3,C-4 and D, Version 2.2 (2012)"},{"key":"26_CR7","unstructured":"Emms, M.: Practical Attack on Contactless Payment Cards. In: HCI 2011 Workshop - Heath, Wealth and Identity Theft (2011)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Potential Misuse of NFC Enabled Mobile Phones with Embedded Security Elements as Contactless Attack Platforms. In: International Conference for Internet Technology and Secured Transactions (2009)","DOI":"10.1109\/ICITST.2009.5402513"},{"key":"26_CR9","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones (2011)"},{"key":"26_CR10","unstructured":"MasterCard: PayPass - M\/Chip Acquirer Implementation Requirements (2006)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is Broken. In: IEEE Symposium on Security and Privacy (2010)","DOI":"10.1109\/SP.2010.33"},{"key":"26_CR12","unstructured":"NXP PN532 User Manual (2007), \n                    \n                      http:\/\/www.adafruit.com\/datasheets\/pn532um.pdf\n                    \n                    \n                   (accessed January 29, 2013)"},{"key":"26_CR13","unstructured":"Oracle: Java Smart Card I\/O API (2012), \n                    \n                      http:\/\/docs.oracle.com\/javase\/7\/docs\/jre\/api\/security\/smartcardio\/spec\/javax\/smartcardio\/package-summary.html\n                    \n                    \n                   (accessed January 29, 2013)"},{"key":"26_CR14","unstructured":"Willey, G.: PIN Number burglar used victims\u2019 card. Newcastle Evening Chronicle (April 27, 2012)"},{"key":"26_CR15","unstructured":"Worldwide EMV Deployment (2011), \n                    \n                      http:\/\/www.emvco.com\/about_emvco.aspx?id=202\n                    \n                    \n                   (accessed January 29, 2013)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39884-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T09:51:17Z","timestamp":1558000277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39884-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398834","9783642398841"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39884-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}