{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:27:21Z","timestamp":1759638441796,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/csf54842.2022.9919666","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:29:20Z","timestamp":1667525360000},"page":"364-379","source":"Crossref","is-referenced-by-count":3,"title":["Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments"],"prefix":"10.1109","author":[{"given":"Ross","family":"Horne","sequence":"first","affiliation":[{"name":"University of Luxembourg,Department of Computer Science,Esch-sur-Alzette,Luxembourg"}]},{"given":"Sjouke","family":"Mauw","sequence":"additional","affiliation":[{"name":"University of Luxembourg,Department of Computer Science,Esch-sur-Alzette,Luxembourg"}]},{"given":"Semen","family":"Yurkov","sequence":"additional","affiliation":[{"name":"University of Luxembourg,Department of Computer Science,Esch-sur-Alzette,Luxembourg"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Card brand mixup attack: Bypassing the PIN in non-Visa cards by using them for Visa transactions","author":"basin","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-171070"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00037"},{"key":"ref34","article-title":"A bisimilarity congruence for the applied $\\pi$-calculus sufficiently coarse to verify privacy properties","volume":"abs 1811 2536","author":"horne","year":"2018","journal-title":"CoRR"},{"key":"ref15","first-page":"1563","article-title":"Modelling and analysis of a hierarchy of distance bounding attacks","author":"chothia","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9048-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00001"},{"journal-title":"Tech Rep 14443-3","article-title":"Cards and security devices for personal identification - contactless proximity objects - part 3: Initialization and anticollision","year":"2018","key":"ref36"},{"journal-title":"The ?-calculus A Theory of Mobile Processes","year":"2001","author":"sangiorgi","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/373243.360213"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85315-0_14"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3209108.3209125"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23638\/LMCS-17(2:24)2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00033"},{"journal-title":"EMVCo LLC","article-title":"EMV ECC key establishment protocols","year":"2013","key":"ref2"},{"journal-title":"Tech Rep","article-title":"EMV Integrated Circuit Card Specifications for Payment Systems. Books 1&#x2013;4","year":"2011","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833642"},{"journal-title":"EMVCo LLC Tech Rep","article-title":"EMV Contactless Specifications for Payment Systems. Book A","year":"2021","key":"ref39"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417235"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_22"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.40"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.15"},{"journal-title":"Tech Rep","article-title":"EMVCo Statement - The Advancement of EMV Chip Specifications","year":"2019","key":"ref45"},{"journal-title":"Formal Analysis of Key Exchange Protocols and Physical Protocols","year":"2012","author":"schmidt","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_28"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03944-7_8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"journal-title":"ProVerif codes and prooftrees","year":"0","key":"ref41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_15"},{"key":"ref44","article-title":"EMV in a nutshell","author":"van den breekel","year":"2016","journal-title":"Tech Rep"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_31"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78636-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00013"},{"key":"ref8","first-page":"1","article-title":"Extending ISO\/IEC 14443 type a eavesdropping range using higher harmonics","author":"engelhardt","year":"0","journal-title":"Proceedings of 2013 European Conference on Smart Objects Systems and Technologies (SmartSysTech)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2008.4652133"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516748"},{"journal-title":"Technical Report","article-title":"EMV next generation. next generation kernel system architecture overview","year":"2014","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Theoretical limits of ISO\/IEC 14443 type A RFID eavesdropping attacks","author":"pfeiffer","year":"0","journal-title":"Smart Systech 2012 European Conference on Smart Objects Systems and Technologies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21966-0_22"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00050"}],"event":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2022,8,7]]},"location":"Haifa, Israel","end":{"date-parts":[[2022,8,10]]}},"container-title":["2022 IEEE 35th Computer Security Foundations Symposium (CSF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9919409\/9919636\/09919666.pdf?arnumber=9919666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:08:13Z","timestamp":1699484893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9919666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/csf54842.2022.9919666","relation":{},"subject":[],"published":{"date-parts":[[2022,8]]}}}