共 34 条
[1]
Alhothaily A, 2014, LECT NOTES COMPUT SC, V8491, P356, DOI 10.1007/978-3-319-07782-6_33
[2]
[Anonymous], TECHNICAL REPORT
[3]
Atkins S, VISA EUROPE CLAIMS G
[4]
Chip and Skim: cloning EMV cards with the pre-play attack
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:49-64
[5]
Bonneau J., 2012, FINANCIAL CRYPTOGRAP, P25
[6]
Brands S, 1994, LECT NOTES COMPUTER, V765, P344, DOI [10.1007/3-540-48285-7_30, DOI 10.1007/3-540-48285-7_30]
[8]
Ceipidor UB, 2012, INT ISC CONF INFO SE, P115, DOI 10.1109/ISCISC.2012.6408203
[9]
Cisco, 2015, Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
[10]
Drimer S, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P87