Back to Results
First PageMeta Content
Near field communication / Radio-frequency identification / Bluetooth / Transmission Control Protocol / Data transmission / Quantum key distribution / Technology / Wireless / Telecommunications engineering


Security in Near Field Communication (NFC) Strengths and Weaknesses
Add to Reading List

Document Date: 2011-11-06 20:12:10


Open Document

File Size: 158,60 KB

Share Result on Facebook

City

Manchester / /

Company

AES / Philips / /

/

IndustryTerm

carrier frequency / metal / noisy device / given sender device / secure device / given protocol / real solution / active device / passive device / correct device / consumer product / cellular network / unauthenticated key agreement protocols / passive devices / user device / initiator device / Active devices / agreement protocol / hardware chip / wireless communication interface / /

NaturalFeature

Secure Channel / /

Person

Eve / Bob / Morris Dworkin / Alice / Alice Bob Eve Figure / Klaus Finkenzeller / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

NFC hardware chip / cellular telephone / Smart Card chip / cryptography / Information technology / key agreement protocol / Block Cipher / Diffie-Hellmann protocol / unauthenticated key agreement protocols / Smart Card / given protocol / amplitude modulation / secret key / Bluetooth / digital camera / certain protocol / /

SocialTag