{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:49:29Z","timestamp":1743004169633,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030995867"},{"type":"electronic","value":"9783030995874"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99587-4_38","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"446-467","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New Security Protocols for\u00a0Offline Point-of-Sale Machines"],"prefix":"10.1007","author":[{"given":"Nour","family":"El Madhoun","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Bertin","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Badra","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"El\u00a0Madhoun, N., Bertin, E., Pujolle, G.: The EMV payment system: is it reliable? In: 2019 3rd Cyber Security in Networking Conference (CSNet), pp. 80\u201385 (2019)","DOI":"10.1109\/CSNet47905.2019.9108846"},{"key":"38_CR2","unstructured":"EMV - Integrated Circuit Card Specifications for Payment Systems. Book 1: Application Independent ICC to Terminal Interface Requirements, Version 4.3. EMVCo (November 2011)"},{"key":"38_CR3","unstructured":"EMV - Integrated Circuit Card Specifications for Payment Systems. Book 2: Security and Key Management, Version 4.3. EMVCo (November 2011)"},{"key":"38_CR4","unstructured":"EMV - Integrated Circuit Card Specifications for Payment Systems. Book 3: Application Specification, Version 4.3. EMVCo (November 2011)"},{"key":"38_CR5","unstructured":"EMV - Integrated Circuit Card Specifications for Payment Systems. Book 4: Cardholder, Attendant, and Acquirer Interface Requirements, Version 4.3. EMVCo (November 2011)"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-27375-9_7","volume-title":"Theory of Security and Applications","author":"J de Ruiter","year":"2012","unstructured":"de Ruiter, J., Poll, E.: Formal analysis of the EMV protocol suite. In: M\u00f6dersheim, S., Palamidessi, C. (eds.) Theory of Security and Applications, pp. 113\u2013129. Springer, Heidelberg (2012). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-27375-9_7"},{"key":"38_CR7","unstructured":"van\u00a0den Breekel, J., Ortiz-Yepes, D.A., Poll, E., de\u00a0Ruiter, J.: EMV in a nutshell. Technical report (2016)"},{"issue":"3","key":"38_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s12243-020-00784-1","volume":"76","author":"N El Madhoun","year":"2021","unstructured":"El Madhoun, N., Bertin, E., Badra, M., Pujolle, G.: Towards more secure EMV purchase transactions. Ann. Telecommun. 76(3), 203\u2013222 (2021)","journal-title":"Ann. Telecommun."},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Basin, D., Sasse, R., Toro-Pozo, J.: The EMV standard: break, fix, verify. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1766\u20131781 (2021)","DOI":"10.1109\/SP40001.2021.00037"},{"key":"38_CR10","unstructured":"Emms, M., van Moorsel, A.: Practical attack on contactless payment cards. In: HCI2011 Workshop Heath, Wealth and Identity Theft (2011)"},{"key":"38_CR11","unstructured":"Lifchitz, R.: Hacking the NFC credit cards for fun and debit. In: Hackito Ergo Sum conference (April 2012)"},{"key":"38_CR12","unstructured":"Cohen, B.: Millions of Barclays card users exposed to fraud (2012). Last connection (24 December 2021)"},{"key":"38_CR13","unstructured":"Tubb, G.: Contactless cards: app reveals security risk (2013). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/news.sky.com\/story\/contactless-cards-app-reveals-security-risk-10443980. Accessed 24 Dec 2021"},{"key":"38_CR14","unstructured":"Emms, M.J.: Contactless payments: usability at the cost of security? Newcastle University, Ph.D. Thesis (2016)"},{"key":"38_CR15","first-page":"58","volume":"8","author":"DA Elminaam","year":"2009","unstructured":"Elminaam, D.A., Kader, H.A., Hadhoud, M.M.: Performance evaluation of symmetric encryption algorithms. Commun. IBIMA 8, 58\u201364 (2009)","journal-title":"Commun. IBIMA"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.procs.2016.04.156","volume":"83","author":"M Badra","year":"2016","unstructured":"Badra, M., Badra, R.B.: A lightweight security protocol for NFC-based mobile payments. Procedia Comput. Sci. 83, 705\u2013711 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Thammarat, C., Kurutach, W., Phoomvuthisarn, S.: A secure lightweight and fair exchange protocol for NFC mobile payment based on limited-use of session keys. In: 17th International Symposium on Communications and Information Technologies (ISCIT), pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/ISCIT.2017.8261168"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Ceipidor, U.B., Medaglia, C.M., Marino, A., Sposato, S., Moroni, A.: KerNeeS: a protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions. In: International ISC Conference on Information Security and Cryptology (ISCISC), pp. 115\u2013120. IEEE (2012)","DOI":"10.1109\/ISCISC.2012.6408203"},{"key":"38_CR19","unstructured":"Lee, Y.S., Kim, E., Jung, M.S.: A NFC based authentication method for defense of the man in the middle attack. In: Proceedings of the 3rd International Conference on Computer Science and Information Technology, pp. 10\u201314 (2013)"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Al-Tamimi, M., Al-Haj, A.: Online security protocol for NFC mobile payment applications. In: 8th International Conference on Information Technology (ICIT), pp. 827\u2013832. IEEE (2017)","DOI":"10.1109\/ICITECH.2017.8079954"},{"key":"38_CR21","first-page":"173","volume":"12","author":"P Pourghomi","year":"2013","unstructured":"Pourghomi, P., Ghinea, G., et al.: A proposed NFC payment application. Int. J. Adv. Comput. Sci. Appl. 12, 173\u2013181 (2013)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"38_CR22","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/978-3-319-10575-8_22","volume-title":"Handbook of Model Checking","author":"D Basin","year":"2018","unstructured":"Basin, D., Cremers, C., Meadows, C.: Model checking security protocols. In: Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R. (eds.) Handbook of Model Checking, pp. 727\u2013762. Springer, Cham (2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-319-10575-8_22"},{"key":"38_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"CJF Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414\u2013418. Springer, Heidelberg (2008). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-540-70545-1_38"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Kahya, N., Ghoualmi, N., Lafourcade, P.: Formal analysis of PKM using scyther tool. In: International Conference on Information Technology and e-Services, pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/ICITeS.2012.6216598"},{"key":"38_CR25","unstructured":"Cremers, C., Lafourcade, P.: Comparing state spaces in automatic protocol verification. In: International Workshop on Automated Verification of Critical Systems (AVoCS) (2007)"},{"key":"38_CR26","doi-asserted-by":"publisher","unstructured":"Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Springer, Heidelberg (2012). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-540-78636-8","DOI":"10.1007\/978-3-540-78636-8"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99587-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:00:37Z","timestamp":1648620037000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/link.springer.com\/10.1007\/978-3-030-99587-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030995867","9783030995874"],"references-count":26,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-030-99587-4_38","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}