Can You Get into the Middle of Near Field Communication?

A recent development emanating from the widely used RFID technology is Near Field Communication (NFC). Basically, NFC is a popular short range (

[1]  Maurizio Pizzonia,et al.  Efficient and practical authentication of PUF-based RFID tags in supply chains , 2010, 2010 IEEE International Conference on RFID-Technology and Applications.

[2]  Busra Ozdenizci,et al.  Development and Performance Analysis of Multifunctional City Smart Card System , 2014 .

[3]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[4]  Di Ma,et al.  Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing , 2013, IEEE Trans. Dependable Secur. Comput..

[5]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[6]  Li Qian,et al.  Physically unclonable function based on disordered photonic structure , 2016, NUSOD 2016.

[7]  Dae Sung Lee,et al.  Vulnerability of Rechargeable RFID Tag Card based on NFC , 2015 .

[8]  K.Pavithra,et al.  Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones , 2014 .

[9]  Ayan Mahalanobis,et al.  Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups , 2005, IACR Cryptol. ePrint Arch..

[10]  Josef Langer,et al.  NFC Devices: Security and Privacy , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[11]  Mike Bond,et al.  2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .

[12]  Xu Jin Anti-collision Algorithm for RFID System , 2009 .

[13]  Collin Mulliner,et al.  Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.

[14]  Yong Guan,et al.  Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[15]  Hou Ligang,et al.  Anti-collision Algorithms for Multi-Tag RFID , 2010 .

[16]  Joeri de Ruiter,et al.  Formal Analysis of the EMV Protocol Suite , 2011, TOSCA.