Can You Get into the Middle of Near Field Communication?
暂无分享,去创建一个
Sriram Chellappan | A. B. M. Alim Al Islam | Tusher Chakraborty | Taslim Arefin Khan | Sajeda Akter | S. Chellappan | A. Islam | Sajeda Akter | T. Khan | Tusher Chakraborty
[1] Maurizio Pizzonia,et al. Efficient and practical authentication of PUF-based RFID tags in supply chains , 2010, 2010 IEEE International Conference on RFID-Technology and Applications.
[2] Busra Ozdenizci,et al. Development and Performance Analysis of Multifunctional City Smart Card System , 2014 .
[3] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[4] Di Ma,et al. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing , 2013, IEEE Trans. Dependable Secur. Comput..
[5] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[6] Li Qian,et al. Physically unclonable function based on disordered photonic structure , 2016, NUSOD 2016.
[7] Dae Sung Lee,et al. Vulnerability of Rechargeable RFID Tag Card based on NFC , 2015 .
[8] K.Pavithra,et al. Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones , 2014 .
[9] Ayan Mahalanobis,et al. Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups , 2005, IACR Cryptol. ePrint Arch..
[10] Josef Langer,et al. NFC Devices: Security and Privacy , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[11] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[12] Xu Jin. Anti-collision Algorithm for RFID System , 2009 .
[13] Collin Mulliner,et al. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.
[14] Yong Guan,et al. Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[15] Hou Ligang,et al. Anti-collision Algorithms for Multi-Tag RFID , 2010 .
[16] Joeri de Ruiter,et al. Formal Analysis of the EMV Protocol Suite , 2011, TOSCA.