%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEEIEEE Transactions on Mobile Computing;2019;18;5;10.1109/TMC.2018.2853114Automated fare collection (AFC)near field communication (NFC)host-based card emulation (HCE)securityvulnerabilityattackcountermeasurePricing Data Tampering in Automated Fare Collection with NFC-Equipped SmartphonesFan DangEnnan ZhaiZhenhua LiPengfei ZhouAziz MohaisenKaigui BianQingfu WenMo Li
IEEE Transactions on Mobile Computing11591 May 201951810.1109/TMC.2018.28531141173
endstream
endobj
2 0 obj
<>stream
8;Z,'_3Nh!%&B9(WLgVejH>b4VqhE[`T3h<@^#kBP!J_%GqY;p^Fd>>UL=_kbl=A6
U/efd=C2"1W&g*[J1^-pp&sI,Ud$]d-ePc[-4SeALHre1%DD=P4iG3Tc\+%;?5/Cc
RhGu#/j4]p3GeWY7%*S.]cVfaFsJ$A^JtI0dAaM67YpW('r7R#M=Osf+JM\l!c>%i
AlMTKe2St8:*pmb2`%51_i]cddBdBUjnjUFc3q#@*%FURd*(%d`*CE?AuiS:UOTeg
o:s+t2"ZA;[H24;Zubb9N)uB\9Rp1oSJQuNU5jI8-0=0c@=+L77'4Yi)]_(r.#d93
ouO(ZK,mr4^!qcS4;-LLB'hNZnc,bO#jT-*cb:L\hK0a`A)W$5IB,MVc/$Q,oe.An
dT0-ZpZM?g3r/?0-\jl:^NooYC$$lUmO,=1?kPA)Zns
?-nLR`($3^7==G\doGI1ik[r39P$9KB?%e2;We'%S#ZDfIA
Q>\9'UmJ-giRss>m$;fV486AR>T1YC+p0I'VK#H.dsgU;%r=NG@1u[DlXbo!7a)4_
S<[Vo3!k~>
endstream
endobj
3 0 obj
[/Indexed/DeviceRGB 255 4 0 R]
endobj
4 0 obj
<>stream
8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0
b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup`
E1r!/,*0[*9.aFIR2&b-C#soRZ7Dl%MLY\.?d>Mn
6%Q2oYfNRF$$+ON<+]RUJmC0InDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j$XKrcYp0n+Xl_nU*O(
l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~>
endstream
endobj
5 0 obj
<>
endobj
6 0 obj
<>
endobj
7 0 obj
<>stream
hdV{\M?ٿsJDvgk^BJJԤHBbz)sPȫrJqW%2#CcR0fwݽ33s?﷾kZgP*B ?"nA@șZ|XҾiM^]S(
]
݉ZU+L^
?"Q
pjBT)f(rzvEB4keppaHLFG:QLP~<82Kˤ7J=yRTz5zZ503bҸ 1350C]2TtԷ#^#k8B,
=f8 #Дh~9bCK-3Dj!9#:< =csԓtjA-Y@ h,H`>UdR^B r\&0q{Nk@ԡQ c@y*WTY`ߓxѨأ
FL\k`64W_qQ1hE0\__PtXF^Q[{S:?x kZ<&eؚh~>ee;Y C#Bn
J_,Ԁ%S$-t[ŜwZk>06xxĠqsW hMn#0c3
<дid҂tA#9wU$zmI (Ho} 0;qNB!_<߰gܹ녭X4oO֧}<+<4c= #q<{f555֢ ı7w