{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:27:46Z","timestamp":1758875266567,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456455.1456468","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"81-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["e-EMV"],"prefix":"10.1145","author":[{"given":"Shane","family":"Balfe","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30232-2_1"},{"key":"e_1_3_2_1_2_1","first-page":"95","volume-title":"Proceedings of the 7th Nordic Workshop on Secure IT Systems","author":"Meaither M.","year":"2003","unstructured":"M. Al-- Meaither and C. J. Mitchell . Extending EMV to Support Murabaha Transactions . In Proceedings of the 7th Nordic Workshop on Secure IT Systems , pages 95 -- 108 . NTNU, 2003 . M. Al--Meaither and C. J. Mitchell. Extending EMV to Support Murabaha Transactions. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pages 95--108. NTNU, 2003."},{"key":"e_1_3_2_1_3_1","first-page":"221","volume-title":"Proceedings of the 6th International Network Conference","author":"Alsaid A.","year":"2006","unstructured":"A. Alsaid and C. J. Mitchell . Preventing Phishing Attacks Using Trusted Computing Technology . In Proceedings of the 6th International Network Conference , pages 221 -- 228 , 2006 . A. Alsaid and C. J. Mitchell. Preventing Phishing Attacks Using Trusted Computing Technology. In Proceedings of the 6th International Network Conference, pages 221--228, 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"AMD Publication no. 24594 rev. 3.11 edition","author":"AMD.","year":"2006","unstructured":"AMD. AMD64 architecture programmer's manual: Volume 2: System programming , AMD Publication no. 24594 rev. 3.11 edition , 2006 . AMD. AMD64 architecture programmer's manual: Volume 2: System programming, AMD Publication no. 24594 rev. 3.11 edition, 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"APACS. Card Fraud Losses Continue to Fall. http:\/\/www.apacs.org.uk\/ March 2007.  APACS. Card Fraud Losses Continue to Fall. http:\/\/www.apacs.org.uk\/ March 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Card Fraud The Facts","author":"APACS.","year":"2007","unstructured":"APACS. Card Fraud The Facts 2007 . http:\/\/www.apacs.org.uk\/, April 2007. APACS. Card Fraud The Facts 2007. http:\/\/www.apacs.org.uk\/, April 2007."},{"key":"e_1_3_2_1_7_1","first-page":"177","volume-title":"Proceedings of the 4th working Smart Card Research and Advanced Applications","author":"Balacheff B.","year":"2001","unstructured":"B. Balacheff , D. Chan , L. Chen , S. Pearson , and G. Proudler . Securing Intelligent Adjuncts Using Trusted Computing Platform Technology . In Proceedings of the 4th working Smart Card Research and Advanced Applications , pages 177 -- 195 . Kluwer Academic , 2001 . B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. In Proceedings of the 4th working Smart Card Research and Advanced Applications, pages 177--195. Kluwer Academic, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/PBPC006E_ch10"},{"volume-title":"Technical report RHUL-MA-2006-9-v2, (Department of Mathematics, Royal Holloway","author":"Balfe S.","key":"e_1_3_2_1_9_1","unstructured":"S. Balfe and K.G. Paterson . Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis. Technical report , Technical report RHUL-MA-2006-9-v2, (Department of Mathematics, Royal Holloway , University of London) . http:\/\/www.rhul.ac.uk\/mathematics\/techreports. S. Balfe and K.G. Paterson. Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis. Technical report, Technical report RHUL-MA-2006-9-v2, (Department of Mathematics, Royal Holloway, University of London). http:\/\/www.rhul.ac.uk\/mathematics\/techreports."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_12_1","volume-title":"Payment Card Industry Data Security Standard -- Version 1.1. https:\/\/www.pcisecuritystandards.org\/","author":"PCI Security Standards Council","year":"2006","unstructured":"PCI Security Standards Council . Payment Card Industry Data Security Standard -- Version 1.1. https:\/\/www.pcisecuritystandards.org\/ , 2006 . PCI Security Standards Council. Payment Card Industry Data Security Standard -- Version 1.1. https:\/\/www.pcisecuritystandards.org\/, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_14_1","volume-title":"December","author":"EMVCo.","year":"2000","unstructured":"EMVCo. Book 3 -- Application Specification, 4.0 edition , December 2000 . EMVCo. Book 3 -- Application Specification, 4.0 edition, December 2000."},{"key":"e_1_3_2_1_15_1","unstructured":"EMVCo. EMV Specifications Version 4.1. http:\/\/www.emvco.com June 2004.  EMVCo. EMV Specifications Version 4.1. http:\/\/www.emvco.com June 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.59"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFMA.2005.17"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314363"},{"key":"e_1_3_2_1_19_1","first-page":"143","volume-title":"The Intel Safer Computer Initiative: Building Blocks for Trusted Computing","author":"Grawrock D.","year":"2006","unstructured":"D. Grawrock . The Intel Safer Computer Initiative: Building Blocks for Trusted Computing , chapter Protected Input and Output, pages 143 -- 164 . Intel Press , 2006 . D. Grawrock. The Intel Safer Computer Initiative: Building Blocks for Trusted Computing, chapter Protected Input and Output, pages 143--164. Intel Press, 2006."},{"key":"e_1_3_2_1_20_1","first-page":"19","volume-title":"USENIX Virtual Machine Research and Technology Symposium","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic Remote Attestation: A Virtual Machine Directed Approach to Trusted Computing . In USENIX Virtual Machine Research and Technology Symposium , pages 19 -- 41 . USENIX, 2004 . V. Haldar, D. Chandra, and M. Franz. Semantic Remote Attestation: A Virtual Machine Directed Approach to Trusted Computing. In USENIX Virtual Machine Research and Technology Symposium, pages 19--41. USENIX, 2004."},{"key":"e_1_3_2_1_21_1","first-page":"163","volume-title":"Proceedings of the 1st USENIX Workshop on Smartcard Technology","author":"Herreweghen E.V.","year":"1999","unstructured":"E.V. Herreweghen and U. Wille . Risks and Potentials of Using EMV for Internet Payments . In Proceedings of the 1st USENIX Workshop on Smartcard Technology , pages 163 -- 174 . USENIX, 1999 . E.V. Herreweghen and U. Wille. Risks and Potentials of Using EMV for Internet Payments. In Proceedings of the 1st USENIX Workshop on Smartcard Technology, pages 163--174. USENIX, 1999."},{"volume-title":"February","year":"2005","key":"e_1_3_2_1_22_1","unstructured":"IBM-Global-Services. IBM Global Business Security Index Report , February 2005 . IBM-Global-Services. IBM Global Business Security Index Report, February 2005."},{"key":"e_1_3_2_1_23_1","volume-title":"Intel Publication no. D52212 edition","author":"Intel-Corporation","year":"2006","unstructured":"Intel-Corporation . LaGrande Technology Preliminary Architecture Specification , Intel Publication no. D52212 edition , May 2006 . Intel-Corporation. LaGrande Technology Preliminary Architecture Specification, Intel Publication no. D52212 edition, May 2006."},{"key":"e_1_3_2_1_24_1","unstructured":"C. Jackson D. Boneh and J. Mitchell. Attack of the transaction generators. http:\/\/crypto.stanford.edu\/SpyBlock\/spyblock.pdf.  C. Jackson D. Boneh and J. Mitchell. Attack of the transaction generators. http:\/\/crypto.stanford.edu\/SpyBlock\/spyblock.pdf."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646162.680359"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.27"},{"key":"e_1_3_2_1_27_1","unstructured":"P. Meadowcroft. Combating card fraud. http:\/\/www.scmagazine.com\/uk\/news\/article\/459478\/combatingcardfraud\/ January 2005.  P. Meadowcroft. Combating card fraud. http:\/\/www.scmagazine.com\/uk\/news\/article\/459478\/combatingcardfraud\/ January 2005."},{"key":"e_1_3_2_1_28_1","series-title":"IEE Professional Applications of Computing Series 6","doi-asserted-by":"crossref","DOI":"10.1049\/PBPC006E","volume-title":"Trusted Computing","author":"Mitchell C.J.","year":"2005","unstructured":"C.J. Mitchell , editor. Trusted Computing . IEE Professional Applications of Computing Series 6 . The Institute of Electrical Engineers (IEE) , London, UK , April 2005 . C.J. Mitchell, editor. Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, April 2005."},{"key":"e_1_3_2_1_29_1","volume-title":"Inc.","author":"Radu C.","year":"2002","unstructured":"C. Radu . Implementing Electronic Card Payment Systems. Artech House , Inc. , 2002 . C. Radu. Implementing Electronic Card Payment Systems. Artech House, Inc., 2002."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179487"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065907.1066038"},{"key":"e_1_3_2_1_32_1","unstructured":"A--R. Sadeghi C. St\u00fcble and N. Pohlmann. European Multilateral Secure Computing Base: Open Trusted Computing for You and Me. http:\/\/www.prosec.rub.de\/ 2004.  A--R. Sadeghi C. St\u00fcble and N. Pohlmann. European Multilateral Secure Computing Base: Open Trusted Computing for You and Me. http:\/\/www.prosec.rub.de\/ 2004."},{"volume-title":"INC","author":"U.S. Securities and Exchange Commission","key":"e_1_3_2_1_33_1","unstructured":"U.S. Securities and Exchange Commission . Form 10-K -- The TJX Companies , INC . http:\/\/www.sec.gov\/, 2007. U.S. Securities and Exchange Commission. Form 10-K -- The TJX Companies, INC. http:\/\/www.sec.gov\/, 2007."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_35_1","volume-title":"May","author":"SETCo.","year":"1997","unstructured":"SETCo. SET Secure Electronic Transaction 1.0 Specification -- The Formal Protocol Definition , May 1997 . SETCo. SET Secure Electronic Transaction 1.0 Specification -- The Formal Protocol Definition, May 1997."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_37_1","volume-title":"Opportunities and challenges. https:\/\/www.trustedcomputinggroup.org\/downloads\/tcgpresentations\/","author":"TCG.","year":"2004","unstructured":"TCG. Trusted computing : Opportunities and challenges. https:\/\/www.trustedcomputinggroup.org\/downloads\/tcgpresentations\/ , 2004 . TCG. Trusted computing: Opportunities and challenges. https:\/\/www.trustedcomputinggroup.org\/downloads\/tcgpresentations\/, 2004."},{"key":"e_1_3_2_1_38_1","unstructured":"TCG. Interoperability Specification for Backup and Migration Services 1.0 revision 1.0 edition 2005.  TCG. Interoperability Specification for Backup and Migration Services 1.0 revision 1.0 edition 2005."},{"key":"e_1_3_2_1_39_1","volume-title":"TCG Specification Architecture Overview Revision 1.2, 1.2 revision 93 edition","author":"TCG.","year":"2006","unstructured":"TCG. TCG Specification Architecture Overview Revision 1.2, 1.2 revision 93 edition , 2006 . TCG. TCG Specification Architecture Overview Revision 1.2, 1.2 revision 93 edition, 2006."},{"key":"e_1_3_2_1_40_1","volume-title":"TCG Mobile Trusted Module Specification, 1.0 revision 1 edition","author":"TCG.","year":"2007","unstructured":"TCG. TCG Mobile Trusted Module Specification, 1.0 revision 1 edition , 2007 . TCG. TCG Mobile Trusted Module Specification, 1.0 revision 1 edition, 2007."},{"key":"e_1_3_2_1_41_1","volume-title":"TPM Main: Parts 1-3: Design Principles, Structures and Commands, 1.2 revision 103 edition","author":"TCG.","year":"2007","unstructured":"TCG. TPM Main: Parts 1-3: Design Principles, Structures and Commands, 1.2 revision 103 edition , 2007 . TCG. TPM Main: Parts 1-3: Design Principles, Structures and Commands, 1.2 revision 103 edition, 2007."},{"key":"e_1_3_2_1_42_1","unstructured":"The Sunday Times. Don't Use Cards at Petrol Stations. http:\/\/business.timesonline.co.uk\/ Febuary 18 2007.  The Sunday Times. Don't Use Cards at Petrol Stations. http:\/\/business.timesonline.co.uk\/ Febuary 18 2007."},{"key":"e_1_3_2_1_43_1","unstructured":"Visa. 3-D Secure Protocol Specification: System Overview. http:\/\/international.visa.com\/fb\/paytech\/secure\/main.jsp May 2003.  Visa. 3-D Secure Protocol Specification: System Overview. http:\/\/international.visa.com\/fb\/paytech\/secure\/main.jsp May 2003."},{"key":"e_1_3_2_1_44_1","unstructured":"Visa. CISP -- List of Validated Payment Applications. http:\/\/usa.visa.com\/merchants\/ October 2007.  Visa. CISP -- List of Validated Payment Applications. http:\/\/usa.visa.com\/merchants\/ October 2007."},{"key":"e_1_3_2_1_45_1","unstructured":"Visa. CISP Bulletin 102307 -- Visa Announces New Payment Application Security Mandates. http:\/\/usa.visa.com\/merchants\/ October 2007.  Visa. CISP Bulletin 102307 -- Visa Announces New Payment Application Security Mandates. http:\/\/usa.visa.com\/merchants\/ October 2007."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 3rd ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456455.1456468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456468"}},"subtitle":["emulating EMV for internet payments with trusted computing technologies"],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":45,"alternative-id":["10.1145\/1456455.1456468","10.1145\/1456455"],"URL":"https:\/\/doi.org\/10.1145\/1456455.1456468","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}