summaryrefslogtreecommitdiff
path: root/articles
diff options
context:
space:
mode:
authorJeff Burdges <burdges@gnunet.org>2016-08-23 16:46:57 +0200
committerJeff Burdges <burdges@gnunet.org>2016-08-23 16:46:57 +0200
commitc83dedf076439ecd04db462e9142202ca1318f98 (patch)
treebb5136b0bb668ec3b8499fa14aa58a9a12ea7d99 /articles
parent40baada528bb20fa77031e8c1bdcc5cf07f1bc86 (diff)
downloadwallet-core-c83dedf076439ecd04db462e9142202ca1318f98.tar.gz
wallet-core-c83dedf076439ecd04db462e9142202ca1318f98.tar.bz2
wallet-core-c83dedf076439ecd04db462e9142202ca1318f98.zip
Add reference for ECB Thurd Report on Card Fraud
Diffstat (limited to 'articles')
-rw-r--r--articles/ui/taler.bib19
-rw-r--r--articles/ui/ui.tex6
2 files changed, 22 insertions, 3 deletions
diff --git a/articles/ui/taler.bib b/articles/ui/taler.bib
index 9117398f7..b59d43a41 100644
--- a/articles/ui/taler.bib
+++ b/articles/ui/taler.bib
@@ -171,3 +171,22 @@
www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
www_section = {Anonymous communication},
}
+
+
+
+@misc{brands1993efficient,
+ title={An efficient off-line electronic cash system based on the representation problem},
+ author={Brands, Stefan A},
+ year={1993},
+ publisher={Centrum voor Wiskunde en Informatica}
+}
+
+@misc{ECB:TRoCF2014,
+ title = {Third Report on Card Fraud},
+ publisher = {European Central Bank},
+ month = {February},
+ year = {2014},
+ howpublished = {\url{https://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201402en.pdf}},
+}
+
+
diff --git a/articles/ui/ui.tex b/articles/ui/ui.tex
index 57232c7fd..5ad0f74e8 100644
--- a/articles/ui/ui.tex
+++ b/articles/ui/ui.tex
@@ -249,9 +249,9 @@ the same anti-forgery protections that are in place for cash.
Against most attacks, customers and merchants {\em limit} their risks
to the amount of cash that they carry or accept at a given
time~\cite{Bankrate}. Additionally, customers are advised to choose
-the ATMs they use carefully, as malicious ATMs may attempt to {\em
- steal} their customer's credentials. Authentication with an ATM can
-involve a special ATM card, or the use of credit or
+the ATMs they use carefully, as malicious ATMs may attempt to
+{\em steal} their customer's credentials~\cite{ECB:TRoCF2014}. Authentication with an
+TM can involve a special ATM card, or the use of credit or
debit cards. In all these cases, these physical security tokens are
issued by the customer's bank.