A Practical Experience with RFID Security
暂无分享,去创建一个
Chen-Mou Cheng | Ming-Yang Chih | Jie-Ren Shih | Chun-Chieh Chen | Anna Inn-Tung Chen | Chen-Mou Cheng | Chun-Chieh Chen | A. Chen | Ming-Yang Chih | Jie-Ren Shih
[1] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[2] Dong Chao,et al. Universal Software Radio Peripheral , 2010 .
[3] Flavio D. Garcia,et al. A Practical Attack on the MIFARE Classic , 2008, CARDIS.
[4] Ioannis G. Askoxylakis,et al. Overview of Security Threats for Smart Cards in the Public Transport Industry , 2008, 2008 IEEE International Conference on e-Business Engineering.
[5] Nicolas Courtois,et al. Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards , 2008, IACR Cryptol. ePrint Arch..
[6] Michael Hutter,et al. RFID and Its Vulnerability to Faults , 2008, CHES.
[7] Bart Jacobs,et al. Dismantling MIFARE Classic , 2008, ESORICS.
[8] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[9] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.