-
1
-
-
79952438809
-
Design of a secure distance-bounding channel for RFID
-
May
-
G.P. Hancke. Design of a secure distance-bounding channel for RFID. Journal of Network and Computer Applications, Vol 34(3), pp. 877-887, May 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.3
, pp. 877-887
-
-
Hancke, G.P.1
-
2
-
-
79952958289
-
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
-
April
-
G.P. Hancke. Practical eavesdropping and skimming attacks on high-frequency RFID tokens. Journal of Computer Security, Vol 19(2), pp. 259-288, April 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.2
, pp. 259-288
-
-
Hancke, G.P.1
-
3
-
-
77954464980
-
NFC mobile transactions and authentication based on GSM network
-
W. Chen, G.P. Hancke, K.E. Mayes, Y. Lien and J.H. Chiu. NFC Mobile Transactions and Authentication Based on GSM Network. Prcoeedings of Second International Workshop on Near Field Communication, pp. 83-89, 2010.
-
(2010)
Prcoeedings of Second International Workshop on Near Field Communication
, pp. 83-89
-
-
Chen, W.1
Hancke, G.P.2
Mayes, K.E.3
Lien, Y.4
Chiu, J.H.5
-
4
-
-
76549120985
-
Attacks on a distance dounding protocol
-
May
-
J. Munilla and A. Peinado. Attacks on a Distance Dounding Protocol. Elsevier Computer Communications, Vol 33(7), pp. 884-889, May 2010.
-
(2010)
Elsevier Computer Communications
, vol.33
, Issue.7
, pp. 884-889
-
-
Munilla, J.1
Peinado, A.2
-
5
-
-
68349138859
-
Security of proximity identification systems
-
Technical Report, UCAM-CL-TR-752, July
-
G.P. Hancke. Security of proximity identification systems. University of Cambridge Computer Laboratory, Technical Report, UCAM-CL-TR-752, July 2009.
-
(2009)
University of Cambridge Computer Laboratory
-
-
Hancke, G.P.1
-
14
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
J. Reid, J. M. G. Nieto, T. Tang and B. Senadji. Detecting relay attacks with timing-based protocols. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 204-213, 2007.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
16
-
-
67049155493
-
The swiss-knife RFID distance bounding protocol
-
C. H. Kim, G. Avoine, F. Koeune, F. X. Standaert and O. Pereira. The swiss-knife RFID distance bounding protocol. Proceedings of Information Security and Cryptology, pp. 98-115, 2008.
-
(2008)
Proceedings of Information Security and Cryptology
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
18
-
-
79952975500
-
A framework for analyzing RFID distance bounding protocols
-
April
-
G. Avoine, M.A. Bingol, S. Kardas, C. Lauradoux and B. Martin. A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security, Volume 19(2), April 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.2
-
-
Avoine, G.1
Bingol, M.A.2
Kardas, S.3
Lauradoux, C.4
Martin, B.5
-
19
-
-
84873160354
-
Identification cards - Contactless integrated circuit cards - Proximity cards
-
ISO/IEC 14443
-
ISO/IEC 14443. Identification cards - Contactless integrated circuit cards - Proximity cards. Technical Standard, 2001.
-
(2001)
Technical Standard
-
-
|