2020
DOI: 10.1007/s12243-020-00784-1
|View full text |Cite
|
Sign up to set email alerts
|

Towards more secure EMV purchase transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…We suggest that the actor P needs to generate an electronic signature SignP, using its sk(P), in order to authenticate itself to C. The verification of the authenticity of P, in order to respond to ReqP, will be performed by another actor as follows [8]:…”
Section: Authentication Procedures For Pmentioning
confidence: 99%
See 4 more Smart Citations
“…We suggest that the actor P needs to generate an electronic signature SignP, using its sk(P), in order to authenticate itself to C. The verification of the authenticity of P, in order to respond to ReqP, will be performed by another actor as follows [8]:…”
Section: Authentication Procedures For Pmentioning
confidence: 99%
“…• C is identified by IdC in the database of IB and not by the PAN as in the EMV protocol [8]. IdC is not a sensitive information as the PAN, it does not present a risk if it is sent in clear because it does not allow to make purchases.…”
Section: Assumptions Of Our Proposalsmentioning
confidence: 99%
See 3 more Smart Citations