{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:36:20Z","timestamp":1725662180143},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973615","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T19:28:35Z","timestamp":1501010915000},"page":"1251-1255","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of credit card attacks using the NFC technology"],"prefix":"10.23919","author":[{"given":"Juraj","family":"Jumic","sequence":"first","affiliation":[]},{"given":"Marin","family":"Vukovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Roel Verdult Practical Attacks on NFC Enabled Cell Phones","year":"0","key":"ref10"},{"journal-title":"Eddie Lee NFC Hacking The Easy Way","year":"0","key":"ref11"},{"journal-title":"Infosec Institute Near Field Communication (NFC) Technology Vulnerabilities and Principal Attack Schema","year":"0","key":"ref12"},{"journal-title":"Nfcin NFC pay security","year":"0","key":"ref13"},{"journal-title":"Credit Card Reader Google Play Store","year":"0","key":"ref14"},{"journal-title":"Ernst Haselsteiner Klemens Breitfu&#x00DF; Security in Near Field Communication (NFC) Strengths and Weaknesses","year":"0","key":"ref15"},{"journal-title":"Radio Electronics","year":"0","key":"ref4"},{"journal-title":"Credit Union National Association","year":"0","key":"ref3"},{"journal-title":"The DEF CON FAQ About Defcon","year":"0","key":"ref6"},{"journal-title":"NFC Forum data exchange format","year":"0","key":"ref5"},{"key":"ref8","article-title":"RFID malware: Truth vs. Myth","author":"tanenbaum","year":"2006","journal-title":"IEEE Security & Privacy"},{"journal-title":"NFCProxy relay application source page","year":"0","key":"ref7"},{"journal-title":"NFC Forum Technical Specifications","year":"0","key":"ref2"},{"journal-title":"History of payments Australian Payments Clearing Association","year":"0","key":"ref1"},{"journal-title":"ISO 7816&#x2013;4 Interindustry Commands for Interchange","year":"0","key":"ref9"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija, Croatia","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973615.pdf?arnumber=7973615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:54:36Z","timestamp":1502898876000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973615","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}