RFID Skimming and Cloning Attacks on Presto Cards
暂无分享,去创建一个
[1] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[2] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[3] Bart Jacobs,et al. Dismantling MIFARE Classic , 2008, ESORICS.
[4] Victor R. Prybutok,et al. Consumer Acceptance of RFID Technology: An Exploratory Study , 2008, IEEE Transactions on Engineering Management.
[5] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[6] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[7] Kwangjo Kim,et al. Open issues in RFID security , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[8] Christof Paar,et al. All You Can Eat or Breaking a Real-World Contactless Payment System (Short Paper) , 2010 .