{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:12:51Z","timestamp":1730279571691,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9825252","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T19:32:34Z","timestamp":1658259154000},"page":"991-996","source":"Crossref","is-referenced-by-count":2,"title":["A New Security Solution Enhancing the Dynamic Array PIN Protocol"],"prefix":"10.1109","author":[{"given":"Samir","family":"Chabbi","sequence":"first","affiliation":[{"name":"University of Souk Ahras,Department of Mathematics and Computer Science,Souk Ahras,Algeria,41000"}]},{"given":"Nour","family":"El Madhoun","sequence":"additional","affiliation":[{"name":"EPITA,Security and System Laboratory,Le Kremlin-Bic&#x00EA;tre,France,94270"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Secure pin authentication in java smart card using honey encryption","author":"kurnaz","year":"2020","journal-title":"2020 International Congress on Human-Computer Interaction Optimization and Robotic Applications (HORA)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127361"},{"key":"ref12","first-page":"1","article-title":"A new smart smudge attack using cnn","author":"shin","year":"2021","journal-title":"International Journal of Information Security"},{"key":"ref13","article-title":"Atm frauds: Detection & prevention","volume":"4","author":"shubhra","year":"2017","journal-title":"International Journal of Advances in Electronics and Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5549"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019EDP7181"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07649-9"},{"journal-title":"Smart payment association Biometrics in Payment Breaking down barriers with high value payments","year":"2018","key":"ref17"},{"journal-title":"Promontory an IBM Company Biometric authentication in payments Considerations for Policymakers","year":"2017","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICMICA48462.2020.9242713"},{"journal-title":"Security evaluation of the nfc contactless payment protocol using model based testing","year":"2018","author":"merkus","key":"ref4"},{"key":"ref3","article-title":"Enhancing the security features of automated teller machines (atms): A ghanaian perspective","volume":"6","author":"gyamfi","year":"2016","journal-title":"International Journal of Applied Science and Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00784-1"},{"key":"ref5","first-page":"391","article-title":"Nfc technology for contactless payment echosystems","volume":"8","author":"wadii","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6653076"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5626\/JCSE.2020.14.4.163"},{"key":"ref2","article-title":"Security analysis of near-field communication (nfc) payments","author":"giese","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3045161"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.156"},{"journal-title":"NFC Functions and Security Certification overview","year":"2018","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1773583"},{"key":"ref24","first-page":"948","article-title":"Multifactor authentication on mobile phones using existing brightpass","volume":"12","author":"deshpande","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18280\/isi.270105"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3233\/JHS-160545"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2601603"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2022,5,30]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09825252.pdf?arnumber=9825252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T20:00:29Z","timestamp":1659988829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9825252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9825252","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}