Modelling customers' intentions to use contactless cards

نویسندگان
چکیده

منابع مشابه

Applying Asynchronous Circuits in Contactless Smart Cards

We have designed an asynchronous chip for contactless smart cards. Asynchronous circuits have two power properties that make them very suitable for contactless devices: low average power and small current peaks. The fact that asynchronous circuits operate over a wide range of the supply voltage, while automatically adapting their speed, has been used to obtain a circuit that is very resilient t...

متن کامل

Range Extension Attacks on Contactless Smart Cards

The security of many near-field RFID systems such as credit cards, access control, e-passports, and e-voting, relies on the assumption that the tag holder is in close proximity to the reader. This assumption should be reasonable due to the fact that the nominal operation range of the RFID tag is only few centimeters. In this work we demonstrate a range extension setup which breaks this proximit...

متن کامل

An Access Management System Using Contactless Cards

This article describes the ESTAccess project implementation, whose goal is to control and track the accesses of students and teachers to classrooms using a contactless ID card (Mifare-classic). The hardware component is composed by an Electronic Door Lock (EDL) and an Access-Point (AP). The software component is composed by firmware in the EDL, a web interface, a database (DB) and a Java applic...

متن کامل

Security Issues with Contactless Bank Cards

Contactless bank cards have been issued steadily to banking customers over the past four years and this trend has continued to grow rapidly more recently. We want to highlight a list of security issues as well as privacy threats to be concerned with when using such contactless bank cards. Further advances in smartphone technology applications can lead to new threats in relation to contactless b...

متن کامل

Side - Channel Monitoring of Contactless Java Cards

Smart cards are small, portable, tamper-resistant computers used in securitysensitive applications ranging from identi_cation and access control to payment systems. Side-channel attacks, which use clues from timing, power consumption, or even electromagnetic (EM) signals, can compromise the security of these devices and have been an active research area since 1996. Newer contactless” cards comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Banking, Accounting and Finance

سال: 2012

ISSN: 1755-3830,1755-3849

DOI: 10.1504/ijbaaf.2012.051590