[1] Anderson, R.J., Needham, R.M. Robustness principles
for public key protocols. CRYPTO 1995. LNCS, vol.
963, pp. 236–247 (1995).
[2] Cyber attacks against banks more severe than most
realize. Internet:
http://www.reuters.com/article/2013/05/18/us-cyber-
summit-banks-idUSBRE94G0ZP20130518 (2014).
[3] APACS: Online banking usage amongst over 55s up
fourfold in five years. Internet:
http://www.apacs.org.uk/media_centre/press/08_24_0
7.html (Aug, 2007).
[4] APACS announces latest fraud figures. Internet:
http://www.apacs.org.uk/APACSannounceslatestfraud
figures.htm (Sep, 2008).
[5] Adam Ali.Zare Hudaib. Banking and modern
payments system security analysis. International
Journal of Computer Science and Security (IJCSS),
vol. 8, issue 2 (2014).
[6] Taylor, M. Police think French pair tortured for pin
details. The Guardian. Internet:
http://www.guardian.co.uk/uk/2008/jul/05/knifecrime.
ukcrime (Jun, 2008).
[7] Finn, C. MTN not budging on fraud issue. IOL
technology. Internet:
http://www.ioltechnology.co.za/article.page.php?iSect
ionId=2885&iArticl%eId=4402087 (May, 2008).
[8] Make Card Readers Optiona. Internet:
http://www.stopthecardreaders.org/ (2008).
[9] Cronto: Products datasheet. Internet:
http://www.cronto.com/download/Cronto_Products_D
atasheet.pdf (2010).
[10] Choudary, O. The smart card detective: a hand-held
EMV interceptor. Master's thesis, University of
Cambridge. Internet:
http://www.cl.cam.ac.uk/~osc22/scd/ (June 2010).
[11] CreditCall. EMV.LIB Integration Guide. Internet:
http://www.level2kernel.com/emvlibfidocumentation.
html (June, 2010).
[12] de Ruiter, J., and Poll, E. Formal analysis of the EMV
protocol suite. Theory of Security and Applications
(TOSCA 2011), vol. 6693 of LNCS, Springer, pp.
113-129 (March, 2011).
[13] EMVCo. Terminal level 2, test cases. Type Approval
(Nov, 2011).
[14] Murdoch, S. J. Reliability of chip & PIN evidence in
banking disputes. Digital Evidence and Electronic
Signature Law Review, vol. 6, Pario Communications,
pp. 98-115 (Nov, 2010).
[15] Murdoch, S. J., Drimer, S., Anderson, R., and Bond,
M. Chip and PIN is broken. IEEE Symposium on
Security and Privacy (Oakland) (May, 2010).
[16] Needham, R. M., and Schroeder, M. D. Using
encryption for authentication in large networks of
computers. Commun. ACM 21, pp. 993-999 (Dec.
1978).
[17] 3-D Secure system overview. Internet:
https://partnernetwork.visa.com/vpn/global/retrieve_d
ocument.do?documentRetrievalId=119 (2011).
[18] RBS Secure Terms of Use. Internet:
https://www.rbssecure.co.uk/rbs/tdsecure/terms_of_us
e.jsp (Dec, 2009).
[19] Cronto. Internet:
http://www.cronto.com/download/Cronto_Products_D
atasheet.pdf (2012).
[20] Adam Ali.Zare Hudaib. E-payment Security Analysis
In Depth. International Journal of Computer Science
and Security (IJCSS), vol. 8, issue 1 (2014).
[21] S. Murdoch and R. Anderson. Verified by Visa and
MasterCard SecureCode: or, How Not to Design
Authentication. Financial Cryptography and Data
Security, Jan. 2010, pp. 42-45.
[22] PayPal. PayPal - Data Security and Encryption.
Internet:
http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/s
ecurity-outside (Dec, 2013).
[23] Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer.
How to Shop for Free Online Security Analysis of
Cashier-as-a-Service Based Web Stores. Internet:
http://research.microsoft.com/pubs/145858/caas-oakl
and-final.pdf (Dec, 2013).
[24] The Secure Sockets Layer Protocol. Internet:
http://www.cs.bris.ac.uk/~bradley/publish/SSLP/chapt
er4.html (Nov, 2013).
[25] SearchSecurity.com. Internet:
http://searchsecurity.techtarget.com/sDefinition/0%2C
%2Csid14_gci214006%2C00.html (Dec, 2013).
[26] Alex Hern. Bitcoin me: How to make your own digital
currency. Internet:
http://www.theguardian.com/technology/2014/jan/07/
bitcoin-me-how-to-make-your-own-digital-curren
cy (Dec, 2013).
[27] Bitcoin. Internet:
http://en.wikipedia.org/wiki/Bitcoin.html (Dec, 2013).
[28] Bitcoins. Internet: http://www.weusecoins.com/en/
(Dec, 2013).
[29] Near field communication. Internet:
http://en.wikipedia.org/wiki/Near_field_communicati
on (Dec, 2013).
[30] Mike Clark. Inside Secure adds sales agents. Internet:
http://www.nfcworld.com/2012/12/05/321436/inside-
secure-adds-sales-agents (Dec, 2013).
[31] NFC and Contactless Technologies. Internet:
http://nfc-forum.org/what-is-nfc/about-the-technolo
gy/ (Dec, 2013).
[32] Important Information Regarding Use of the
Microsoft Internet Explorer Web Browser. Internet:
http://www.consumer.ftc.gov/articles/0155-free-credi
t-reports (2014).
[33] Heartbleed. Internet: http://heartbleed.com (2014).
[34] Abhishek Gandhi. Advanced Online Banking
Authentication System Using One Time Passwords
Embedded in Q-R Code. International Journal of
Computer Science and Information Technologies, Vol.
5 (2) , 2014, pp. 1327-1329.
[35] Terry Hartmann. Multi-Factor Authentication for Era
of Zero Trust. Internet:
http://www.bai.org/bankingstrategies/Risk-Managem
ent-and-Fraud/Security/Fraud/Multi-Factor-Authent
ication-for-Era-of-Zero-Trust (Apr, 2014).
[36] Response to the European Central Bank –
Recommendations for the Security of Internet
Payments. Internet:
ttp://www.ecb.europa.eu/paym/pol/activ/instr/shared/f
iles/PayPal.pdf (2014).