{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:16:00Z","timestamp":1729624560575,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/hpcsim.2015.7237043","type":"proceedings-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T17:45:56Z","timestamp":1441302356000},"page":"221-228","source":"Crossref","is-referenced-by-count":6,"title":["Trusted host-based card emulation"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Armando","sequence":"first","affiliation":[]},{"given":"Alessio","family":"Merlo","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Verderame","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"An automated formal analysis of the security of the internet key exchange (ike) protocol in the presence of compromising adversaries","year":"2010","author":"kyburz","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1497308.1497411"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_11"},{"journal-title":"Smart Card Alliance Tech Rep","article-title":"Host Card Emulation (HCE) 101","year":"2014","key":"ref30"},{"key":"ref10","first-page":"7:1","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium Ser SS'07"},{"journal-title":"Contactless integrated circuit cards-Proximity cards-Part 3 Initialization and anticollision","article-title":"ISO\/IEC14443&#x2013;3:2011 Identification cards","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2012.10"},{"key":"ref15","article-title":"Software card emulation in nfc-enabled mobile phones: Great advantage or security nightmare?","author":"roland","year":"2012","journal-title":"4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use"},{"article-title":"SE in the Cloud: Bankinter Solution for Mobile Contactless Payments","year":"2013","author":"nordlund","key":"ref16"},{"journal-title":"GlobalPlatform Tech Rep","article-title":"The trusted execution environment: Delivering enhanced security at a lower cost to the mobile market","year":"2011","key":"ref17"},{"article-title":"TEE System Architecture v1.0 GPD_SPE_009","year":"2011","author":"platforms","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-642-30921-2_10","article-title":"Trustworthy execution on mobile devices: What security properties can my mobile platform give me?","author":"vasudevan","year":"2012","journal-title":"Proceedings of the 5th International Conference on Trust and Trustworthy Computing TRUST'12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"year":"2014","key":"ref4","article-title":"Near field communication (nfc) market analysis by product (auxiliary, non-auxiliary), by application (payment, transportation, booking, data sharing, service, access control, healthcare) and segment forecasts to 2020"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/11495628_4","article-title":"Operational semantics of security protocols","author":"cremers","year":"2005","journal-title":"Scenarios Models Transformations and Tools"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2014.61"},{"key":"ref6","article-title":"White paper - HCE security implications, analyzing the security aspects of HCE","author":"janssen","year":"0","journal-title":"UL Transaction Security 2014"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/1533057.1533074","article-title":"On-board credentials with open provisioning","author":"kostiainen","year":"2009","journal-title":"Proceedings of the 4th International Symposium on Information Computer and Communications Security ser ASIACCS '09"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2014.6734919"},{"journal-title":"Sun Microsystems Inc Tech Rep","article-title":"The Java Card&#x2122; 3 Platform White Paper","year":"2008","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0935-5"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"13389","DOI":"10.3390\/s140813389","article-title":"Mobipag: Integrated mobile payment, ticketing and couponing solution based on nfc","volume":"14","author":"rodrigues","year":"2014","journal-title":"Sensors (Switzerland)"},{"journal-title":"Part 4 Organization security and commands for interchange","article-title":"ISO\/IEC 7816-4:2013. Identification cards Integrated circuit cards","year":"0","key":"ref9"},{"article-title":"Nfc-enabled access control and management system","year":"2015","author":"saparkhojayev","key":"ref1"},{"key":"ref20","article-title":"M-Shield&#x2122;Mobile Security Technology: making wireless secure","author":"jerome","year":"2008","journal-title":"Texas Instruments Tech Rep"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848461"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637225"},{"key":"ref23","first-page":"154","article-title":"Unknown key-share attacks on the station-to-station (sts) protocol","volume":"1560","author":"blake-wilson","year":"1999","journal-title":"Public Key Cryptography Second International Workshop on Practice and Theory in Public Key Cryptography PKC '99 Kamakura Japan March 1&#x2013;3 1999 Proceedings ser Lecture Notes inComputer Science"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1981.32"},{"key":"ref25","article-title":"On the secure hash algorithm family","author":"penard","year":"2008","journal-title":"Technical Report of National Security Agency"}],"event":{"name":"2015 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2015,7,20]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2015,7,24]]}},"container-title":["2015 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7214433\/7237005\/07237043.pdf?arnumber=7237043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T14:54:27Z","timestamp":1498229667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7237043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2015.7237043","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}