{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:25:29Z","timestamp":1729671929185,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/csnet.2017.8241995","type":"proceedings-article","created":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T16:31:33Z","timestamp":1514824293000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Magic always comes with a price: Utility versus security for bank cards"],"prefix":"10.1109","author":[{"given":"Nour El","family":"Madhoun","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Bertin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2012.6408203"},{"year":"0","key":"ref38"},{"key":"ref33","article-title":"Hacking the nfc credit cards for fun and debit","author":"lifchitz","year":"2012","journal-title":"Hackito Ergo Sum conference"},{"key":"ref32","article-title":"Practical attack on contactless payment cards","author":"emms","year":"2011","journal-title":"HCI2011 Workshop-Heath Wealth and Identity Theft"},{"journal-title":"La norme emv","year":"2009","author":"bouzefrane","key":"ref31"},{"journal-title":"Authentication","year":"2017","key":"ref30"},{"key":"ref37","first-page":"346","article-title":"Privilege escalation attacks on android","author":"davi","year":"2010","journal-title":"International Conference on Information Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2016.7440225"},{"journal-title":"Les experts Ooreka","article-title":"Ticket de carte bancaire","year":"2017","key":"ref34"},{"journal-title":"Nopanda","article-title":"La difference majeure entre visa, master card et american express","year":"2017","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335332"},{"journal-title":"Visa amex mastercard discover - what's the difference?","year":"2017","author":"peter rubin","key":"ref11"},{"journal-title":"Comprendre les paiements","article-title":"Modele a 3 coins en monetique","year":"2017","key":"ref12"},{"journal-title":"Diners Club","year":"2017","key":"ref13"},{"journal-title":"Discover Card","year":"2017","key":"ref14"},{"journal-title":"American Express","year":"2017","key":"ref15"},{"journal-title":"Comprendre les paiements","article-title":"Modele a 4 coins en monetique","year":"2017","key":"ref16"},{"journal-title":"Visa","year":"2017","key":"ref17"},{"journal-title":"Mastercard","year":"2017","key":"ref18"},{"key":"ref19","first-page":"1","author":"el madhoun","year":"2016","journal-title":"A secure cloud-based nfc payment architecture for small traders"},{"journal-title":"Nov 2011","year":"0","key":"ref28"},{"journal-title":"Visa","article-title":"Je decouvre les details de la carte bancaire","year":"2017","key":"ref4"},{"journal-title":"Argent et voyages","article-title":"Les paiements par bande magnetique a l'etranger","year":"2017","key":"ref27"},{"journal-title":"La finance pour tous","article-title":"La carte bancaire","year":"2017","key":"ref3"},{"journal-title":"Parts of a debit or credit card","year":"2017","author":"pritchard","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.33"},{"journal-title":"International Organization for Standardization (ISO)","article-title":"Iso\/iec 7810:2003 identification cards - physical characteristics","year":"2017","key":"ref5"},{"journal-title":"Next Banq","article-title":"Choisir sa carte bancaire","year":"2017","key":"ref8"},{"journal-title":"PCI Security Standards Council","article-title":"Pci data storage do's and don'ts","year":"2017","key":"ref7"},{"journal-title":"Federation bancaire francaise","article-title":"Les moyens de paiement","year":"2017","key":"ref2"},{"journal-title":"Brimstone-consulting","article-title":"What are three and four party card schemes?","year":"2017","key":"ref9"},{"journal-title":"Etude de l' institut de sondages d'opinion CSA","article-title":"Les francais et les moyens de paiement","year":"2017","key":"ref1"},{"journal-title":"Understanding and preventing point of sale attacks","year":"2017","author":"grunzweig","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0289"},{"journal-title":"Fintech Smile pay leve un million d'euros aupres de sa maison mere","year":"0","author":"rome","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MSP.2017.27","article-title":"Does the online card payment landscape unwittingly facilitate fraud?","volume":"15","author":"ali","year":"2017","journal-title":"IEEE Security & Privacy"},{"key":"ref23","first-page":"93","article-title":"Near field communication (nfc)","author":"al-ofeishat","year":"2012","journal-title":"International Journal of Computer Science and Network Security"},{"journal-title":"Fime","article-title":"Level 2 payment terminal compliance test tool","year":"2017","key":"ref26"},{"journal-title":"Penfed Credit Union","article-title":"Credit card security-emv chip technology","year":"2017","key":"ref25"}],"event":{"name":"2017 1st Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2017,10,18]]},"location":"Rio de Janeiro","end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 1st Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231154\/8241982\/08241995.pdf?arnumber=8241995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T18:31:46Z","timestamp":1570559506000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8241995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/csnet.2017.8241995","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}