메뉴 건너뛰기




Volumn , Issue , 2009, Pages 87-92

Risk analysis of over-the-air transactions in an NFC ecosystem

Author keywords

[No Author keywords available]

Indexed keywords

APPLETS; CREDIT CARDS; NEAR FIELD COMMUNICATIONS; PROTECTION PROFILE; SECURITY POINT; SECURITY STANDARDS; SERVICE MANAGERS; SMART-CARD APPLICATION;

EID: 70449373265     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NFC.2009.17     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 1
    • 52149122687 scopus 로고    scopus 로고
    • G. Madlmayr, J. Langer, and J. Scharinger, Managing an nfc ecosystem, in Proceedings of the 7th Conference on Management of mobile Business, ESADE Business School. IEEE Computer Society, 07 2008.
    • G. Madlmayr, J. Langer, and J. Scharinger, "Managing an nfc ecosystem," in Proceedings of the 7th Conference on Management of mobile Business, ESADE Business School. IEEE Computer Society, 07 2008.
  • 2
    • 52149116063 scopus 로고    scopus 로고
    • Sichere Infrastruktur zur Fernverwaltung von Smartcard-Chips in einem NFC-Ökosystem
    • TU Berlin. Deutsche Gesellschaft für Informatik, Fachgruppe für Sicherheit, 06
    • G. Madlmayr, J. Ecker, J. Langer, and J. Scharinger, "Sichere Infrastruktur zur Fernverwaltung von Smartcard-Chips in einem NFC-Ökosystem," in Proceedings of DACH Security, TU Berlin. Deutsche Gesellschaft für Informatik, Fachgruppe für Sicherheit, 06 2008.
    • (2008) Proceedings of DACH Security
    • Madlmayr, G.1    Ecker, J.2    Langer, J.3    Scharinger, J.4
  • 3
    • 84869675813 scopus 로고    scopus 로고
    • It-sicherheitsexpertine ingrid schaumüller-bichl
    • H. Malleck, "It-sicherheitsexpertine ingrid schaumüller-bichl, " OCG Journal, vol. 02, pp. 18 - 19, 2008.
    • (2008) OCG Journal , vol.2 , pp. 18-19
    • Malleck, H.1
  • 4
    • 49049094901 scopus 로고    scopus 로고
    • S. Tjoa, S. Jakoubi, and G. Quirchmayr, Enhacning business impact analysis and risk assessment applying a risk-aware business process model and simulation methodology, in Proceedings of the 3rd International Conference on Availability, Reliability and Security, S. Jakoubi, S. Tjoa, and E. R. Weippl, Eds., 03, DEXA Society. IEEE Computer Society, 03 2008, p. 6.
    • S. Tjoa, S. Jakoubi, and G. Quirchmayr, "Enhacning business impact analysis and risk assessment applying a risk-aware business process model and simulation methodology," in Proceedings of the 3rd International Conference on Availability, Reliability and Security, S. Jakoubi, S. Tjoa, and E. R. Weippl, Eds., vol. 03, DEXA Society. IEEE Computer Society, 03 2008, p. 6.
  • 5
    • 84869669073 scopus 로고    scopus 로고
    • Common Criteria Protection Profile Mobile Synchronisation Services (MSS PP), Bundesamt für Sicherheit in der Informationstechnik (BSI), Godesberger Allee 185-189 D-53175 Bonn, Germany.
    • Common Criteria Protection Profile Mobile Synchronisation Services (MSS PP), Bundesamt für Sicherheit in der Informationstechnik (BSI), Godesberger Allee 185-189 D-53175 Bonn, Germany.
  • 6
    • 70449351935 scopus 로고    scopus 로고
    • 1st ed, Atmel, Infineon Technologies AG, NXP Semiconductors, Renesas Technology Europe Ltd. and STMicroelectronics, June
    • Security IC Platform Protection Profile, 1st ed., Atmel, Infineon Technologies AG, NXP Semiconductors, Renesas Technology Europe Ltd. and STMicroelectronics, June 2007.
    • (2007) Security IC Platform Protection Profile
  • 8
    • 84869680696 scopus 로고    scopus 로고
    • Österreichisches Informationssicherheitshandbuch, Österreichische Computer Gesellschaft, April 2007, version 2.3
    • Österreichisches Informationssicherheitshandbuch, Österreichische Computer Gesellschaft, April 2007, version 2.3.
  • 11
    • 49049112068 scopus 로고    scopus 로고
    • G. Madlmayr, J. Langer, C. Schaffer, and J. Scharinger, Nfc devices: Security and privacy, in Proceedings of the 3rd International Conference on Availability, Reliability and Security, S. Jakoubi, S. Tjoa, and E. R. Weippl, Eds., 03, DEXA Society. IEEE Computer Society, 03 2008, p. 6.
    • G. Madlmayr, J. Langer, C. Schaffer, and J. Scharinger, "Nfc devices: Security and privacy," in Proceedings of the 3rd International Conference on Availability, Reliability and Security, S. Jakoubi, S. Tjoa, and E. R. Weippl, Eds., vol. 03, DEXA Society. IEEE Computer Society, 03 2008, p. 6.
  • 13
    • 70449353075 scopus 로고    scopus 로고
    • Internet Security Threat Report, 13rd ed., Symantec, April 2008.
    • Internet Security Threat Report, 13rd ed., Symantec, April 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.