{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:33:50Z","timestamp":1725842030579},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271514"},{"type":"electronic","value":"9783319271521"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27152-1_2","type":"book-chapter","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T04:55:10Z","timestamp":1449636910000},"page":"21-39","source":"Crossref","is-referenced-by-count":16,"title":["Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment"],"prefix":"10.1007","author":[{"given":"Maryam","family":"Mehrnezhad","sequence":"first","affiliation":[]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Siamak F.","family":"Shahandashti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"2_CR1","unstructured":"Book 2 - Security and Key Management (2011). \n http:\/\/www.emvco.com\/specifications.aspx?id=223"},{"key":"2_CR2","unstructured":"International Organization for Standardization, BS ISO\/IEC 14443\u20131:2008+A1:2012 Identification cards. Contactless integrated circuit cards. Proximity cards. Physical characteristics (2012). \n http:\/\/www.bsol.bsigroup.com"},{"key":"2_CR3","unstructured":"International Organization for Standardization, BS ISO\/IEC 14443\u20132:2010+A2:2012 Identification cards. Contactless integrated circuit cards. Proximity cards. Radio frequency power and signal interface (2012). \n http:\/\/www.bsol.bsigroup.com"},{"key":"2_CR4","unstructured":"International Organization for Standardization, BS ISO\/IEC 7816\u20134:2013, Identification cards. Integrated circuit cards. Organization, security and commands for interchange (2013). \n http:\/\/www.bsol.bsigroup.com"},{"key":"2_CR5","unstructured":"EMV Acquirer and Terminal Security Guidelines (2014). \n http:\/\/www.emvco.com\/specifications.aspx?id=71"},{"key":"2_CR6","unstructured":"EMV Issuer and Application Security Guidelines (2014). \n http:\/\/www.emvco.com\/specifications.aspx?id=71"},{"key":"2_CR7","unstructured":"International Organization for Standardization, BS ISO\/IEC 14443\u20133:2011+A6:2014 Identification cards. Contactless integrated circuit cards. Proximity cards. Initialization and anticollision (2014). \n http:\/\/www.bsol.bsigroup.com"},{"key":"2_CR8","unstructured":"International Organization for Standardization, BS ISO\/IEC 14443\u20134:2008+A4:2014 Identification cards. Contactless integrated circuit cards. Proximity cards. Transmission protocol (2014). \n http:\/\/www.bsol.bsigroup.com"},{"key":"2_CR9","unstructured":"Mobile payment strategies: Remote, contactless & money transfer 2014\u20132018. Market leading report by Juniper Research, July 2014. \n http:\/\/www.juniperresearch.com\/reports.php?id=726"},{"key":"2_CR10","unstructured":"EMV Contactless Specifications for Payment Systems, Book A: Architecture and General Requirements (2015). \n http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"2_CR11","unstructured":"EMV Contactless Specifications for Payment Systems, Book B: Entry Point (2015). \n http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"2_CR12","unstructured":"EMV Contactless Specifications for Payment Systems, Book C2: Kernel 2 Specification (2015). \n http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"2_CR13","unstructured":"EMV Contactless Specifications for Payment Systems, Book C3: Kernel 3 Specification (2015). \n http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"2_CR14","unstructured":"EMV Contactless Specifications for Payment Systems, Book D: Contactless Communication Protocol (2015). \n http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-540-74853-3_18","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"D Bichler","year":"2007","unstructured":"Bichler, D., Stromberg, G., Huemer, M., L\u00f6w, M.: Key generation based on acceleration data of shaking processes. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 304\u2013317. Springer, Heidelberg (2007)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"2_CR17","unstructured":"Chong, M.K., Gellersen, H.: How users associate wireless devices. In: Proceedingsof the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 1909\u20131918. ACM, New York, (2011)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with contextawarecommunications. In: Proceedings of the 15th ACM conference on Computerand communications security, pp. 479\u2013490. ACM (2008)","DOI":"10.1145\/1455770.1455831"},{"key":"2_CR19","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS 2007, pp. 7:1\u20137:16. USENIX Association, Berkeley (2007)"},{"key":"2_CR20","unstructured":"Emms, M., van Moorsel, A.: Practical attack on contactless payment cards. In: HCI2011 Workshop-Heath, Wealth and Identity Theft (2011)"},{"key":"2_CR21","unstructured":"Francis, L., Hancke, G.P., Mayes, K., Markantonakis, K.: Practical relay attack on contactless transactions by using nfc mobile phones. In: IACR Cryptology ePrint Archive, p. 618 (2011)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-642-33167-1_22","volume-title":"Computer Security \u2013 ESORICS 2012","author":"T Halevi","year":"2012","unstructured":"Halevi, T., Ma, D., Saxena, N., Xiang, T.: Secure proximity detection for nfc devices based on ambient sensor data. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 379\u2013396. Springer, Heidelberg (2012)"},{"key":"2_CR23","unstructured":"Hesseldahl, A.: Apple iPhone 4 parts cost about \n \n \n \n $$\\$188$$\n \n \n \n $\n 188\n \n \n \n . Bloomberg Business, June 2010. \n http:\/\/www.bloomberg.com\/bw\/technology\/content\/jun2010\/tc20100627_763714.htm"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Hinckley, K.: Synchronous gestures for multiple persons and computers. In: Proceedings of the 16th Annual ACM Symposium on User Interface Software and Technology, UIST 2003, pp. 149\u2013158. ACM, New York (2003)","DOI":"10.1145\/964696.964713"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Ion, I., Langheinrich, M., Kumaraguru, P., \u010capkun, S.: Influence of user perception, security needs, and social factors on device pairing method choices. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, pp. 6:1\u20136:13. ACM, New York (2010)","DOI":"10.1145\/1837110.1837118"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Keogh, E.J., Pazzani, M.J.: Derivative dynamic time warping. In: The 1st SIAM International Conference on Data Mining (SDM-2001). SIAM, Chicago (2001)","DOI":"10.1137\/1.9781611972719.1"},{"key":"2_CR27","unstructured":"Kirovski, D., Sinclair, M., Wilson, D.: The martini synch. Technical report MSR-TR-2007-123, Microsoft Research, September 2007"},{"key":"2_CR28","unstructured":"Kirovski, D., Sinclair, M., Wilson, D.: The martini synch: device pairing via joint quantization. In: IEEE International Symposium on Information Theory, 2007. ISIT 2007, pp. 466\u2013470, June 2007"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., Wang, Y.: Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, pp. 10:1\u201310:12. ACM, New York (2009)","DOI":"10.1145\/1572532.1572546"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Li, H., Ma, D., Saxena, N., Shrestha, B., Zhu, Y.: Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 25\u201330. ACM, New York (2013)","DOI":"10.1145\/2462096.2462101"},{"key":"2_CR31","unstructured":"Lieb, D.: All good things (2014). \n http:\/\/blog.bu.mp\/post\/71781606704\/all-good-things"},{"issue":"6","key":"2_CR32","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.pmcj.2009.07.007","volume":"5","author":"J Liu","year":"2009","unstructured":"Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: accelerometer-based personalized gesture recognition and its applications. Pervasive Mob. Comput. 5(6), 657\u2013675 (2009)","journal-title":"Pervasive Mob. Comput."},{"issue":"2","key":"2_CR33","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TDSC.2012.89","volume":"10","author":"D Ma","year":"2013","unstructured":"Ma, D., Saxena, N., Xiang, T., Zhu, Y.: Location-aware and safer cards: enhancing RFID security and privacy via location sensing. IEEE Trans. Dependable Secure Comput. 10(2), 57\u201369 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-73275-4_1","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"R Mayrhofer","year":"2007","unstructured":"Mayrhofer, R.: The candidate key protocol for generating secret shared keys from similar sensor data streams. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 1\u201315. Springer, Heidelberg (2007)"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-72037-9_9","volume-title":"Pervasive Computing","author":"R Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Gellersen, H.-W.: Shake well before use: authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144\u2013161. Springer, Heidelberg (2007)"},{"issue":"6","key":"2_CR36","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TMC.2009.51","volume":"8","author":"R Mayrhofer","year":"2009","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: intuitive and secure pairing of mobile devices. IEEE Trans. Mob. Comput. 8(6), 792\u2013806 (2009)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-642-16822-2_2","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"N Saxena","year":"2010","unstructured":"Saxena, N., Voris, J.: Still and silent: motion detection for enhanced RFID security and privacy without changing the usage model. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 2\u201321. Springer, Heidelberg (2010)"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","first-page":"344","volume-title":"Financial Cryptography and Data Security","author":"B Shrestha","year":"2014","unstructured":"Shrestha, B., Saxena, N., Truong, H.T.T., Asokan, N.: Drone to the rescue: relay-resilient authentication using ambient multi-sensing. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 344\u2013359. Springer, Heidelberg (2014)"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Studer, A., Passaro, T., Bauer, L.: Don\u2019t bump, shake on it: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 333\u2013342. ACM, New York (2011)","DOI":"10.1145\/2076732.2076780"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27152-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T21:02:54Z","timestamp":1559336574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27152-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271514","9783319271521"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27152-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}