Return to Article Details Contactless cards: How technology works and how to protect unauthorized transactions using a ‘armored’ card holder Download Download PDF