{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:26:45Z","timestamp":1765268805057,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3485887","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T13:42:32Z","timestamp":1638798152000},"page":"375-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks"],"prefix":"10.1145","author":[{"given":"Mahshid","family":"Mehr Nezhad","sequence":"first","affiliation":[{"name":"University of Warwick, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Warwick, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"volume-title":"Security engineering: a guide to building dependable distributed systems","author":"Anderson Ross","key":"e_1_3_2_1_1_1","unstructured":"Ross Anderson. 2020. Security engineering: a guide to building dependable distributed systems. John Wiley & Sons."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"David Basin Ralf Sasse and Jorge Toro-Pozo. 2020. The EMV Standard: Break Fix Verify. arXiv preprint arXiv:2006.08249(2020).","DOI":"10.1109\/SP40001.2021.00037"},{"key":"e_1_3_2_1_3_1","volume-title":"\u201cquick and dirty\u2019usability. Usability evaluation in industry 189","author":"Brooke John","year":"1996","unstructured":"John Brooke. 1996. Sus: a \u201cquick and dirty\u2019usability. Usability evaluation in industry 189 (1996)."},{"key":"e_1_3_2_1_4_1","volume-title":"the OnePlus 8 Pro doesn\u2019t have an x-ray camera \u2014 here\u2019s what\u2019s actually happening.","author":"Central Android","year":"2021","unstructured":"Android Central. [n.d.]. No, the OnePlus 8 Pro doesn\u2019t have an x-ray camera \u2014 here\u2019s what\u2019s actually happening. Available at https:\/\/www.androidcentral.com\/no-oneplus-8-pro-doesnt-have-x-ray-camera. Accessed 15 June 2021."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455831"},{"key":"e_1_3_2_1_6_1","volume-title":"Joint Workshop on Theory of Security and Applications. Springer, 113\u2013129","author":"De\u00a0Ruiter Joeri","year":"2011","unstructured":"Joeri De\u00a0Ruiter and Erik Poll. 2011. Formal analysis of the EMV protocol suite. In Joint Workshop on Theory of Security and Applications. Springer, 113\u2013129."},{"key":"e_1_3_2_1_7_1","first-page":"15","article-title":"Representing attitude: Euler angles, unit quaternions, and rotation vectors","volume":"58","author":"Diebel James","year":"2006","unstructured":"James Diebel. 2006. Representing attitude: Euler angles, unit quaternions, and rotation vectors. Matrix 58, 15-16 (2006), 1\u201335.","journal-title":"Matrix"},{"key":"e_1_3_2_1_8_1","unstructured":"Saar Drimer Steven\u00a0J Murdoch 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.. In USENIX security symposium Vol.\u00a0312."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Martin Emms Budi Arief Troy Defty Joseph Hannon Feng Hao 2012. The dangers of verify PIN on contactless cards. School of Computing Science Technical Report Series (2012).","DOI":"10.1007\/978-3-642-39884-1_26"},{"key":"e_1_3_2_1_10_1","unstructured":"LLC EMVCo. 2011. EMV Integrated Circuit Card Specifications for Payment Systems Book 2 Security and Key Management Version 4.3."},{"key":"e_1_3_2_1_11_1","volume-title":"The problems with contactless cards.","author":"United","year":"2021","unstructured":"United\u00a0Kingdom Finance. [n.d.]. The problems with contactless cards. Available at http:\/\/www.contactlesspaymentcards.com\/problems-with-contactless-cards.php. Accessed 8 September 2021."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926325.1926331"},{"volume-title":"Radio Frequency Identification System Security","author":"Francis Lishoy","key":"e_1_3_2_1_13_1","unstructured":"Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. 2012. Practical relay attack on contactless transactions by using NFC mobile phones. In Radio Frequency Identification System Security. IOS Press, 21\u201332."},{"key":"e_1_3_2_1_14_1","unstructured":"United\u00a0Kingdom Government. [n.d.]. 2021 Budget Plan. Available at https:\/\/www.gov.uk\/government\/publications\/budget-2021-documents. Accessed 01 June 2021."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019794"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 142\u2013159","author":"Gurulian Iakovos","year":"2017","unstructured":"Iakovos Gurulian, Gerhard\u00a0P Hancke, Konstantinos Markantonakis, and Raja\u00a0Naeem Akram. 2017. May the force be with you: Force-based relay attack detection. In International Conference on Smart Card Research and Advanced Applications. Springer, 142\u2013159."},{"volume-title":"Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Gurulian Iakovos","key":"e_1_3_2_1_17_1","unstructured":"Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, and Raja\u00a0Naeem Akram. 2018. Good vibrations: artificial ambience-based relay attack detection. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, 481\u2013489."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505626"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000094"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185457"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27152-1_2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363195"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2839604"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41332-2_5"},{"volume-title":"Cryptography: theory and practice","author":"Stinson R","key":"e_1_3_2_1_28_1","unstructured":"Douglas\u00a0R Stinson. 2005. Cryptography: theory and practice. Chapman and Hall\/CRC."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076780"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","acronym":"ACSAC '21","location":"Virtual Event USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3485887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:14:10Z","timestamp":1755890050000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":30,"alternative-id":["10.1145\/3485832.3485887","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3485887","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}