Sciweavers

173 search results - page 13 / 35
» Classification of RFID Attacks
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 7 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
WISTP
2007
Springer
14 years 1 months ago
An Embedded System for Practical Security Analysis of Contactless Smartcards
ISO 14443 compliant smartcards are widely-used in privacy and security sensitive applications. Due to the contactless interface, they can be activated and read out from a distance....
Timo Kasper, Dario Carluccio, Christof Paar
RFIDSEC
2010
13 years 6 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
TEI
2009
ACM
111views Hardware» more  TEI 2009»
14 years 2 months ago
Stick, Click n' Call: self-adhesive pressure-activated RFID tags for mobile phones
This paper describes a new interaction concept, which is based on customizable self-adhesive stickers with an integrated button, manufacturable at low cost. By pressing the button...
Fabian Hemmert, André Knörig, Gesche J...
CN
2004
124views more  CN 2004»
13 years 7 months ago
DDoS attacks and defense mechanisms: classification and state-of-the-art
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in today
Christos Douligeris, Aikaterini Mitrokotsa