<--- Back to Details
First PageDocument Content
MIFARE / Technology / Radio-frequency identification / Harald Welte / Taipei / Oyster card / Gpl-violations.org / Transport / Computing / Taipei Metro / EasyCard / Ubiquitous computing
Date: 2011-07-15 17:09:41
MIFARE
Technology
Radio-frequency identification
Harald Welte
Taipei
Oyster card
Gpl-violations.org
Transport
Computing
Taipei Metro
EasyCard
Ubiquitous computing

The EasyCard system Analyzing the EasyCard Tampering with the EasyCard

Add to Reading List

Source URL: events.ccc.de

Download Document from Source Website

File Size: 965,13 KB

Share Document on Facebook

Similar Documents

FOSS Licenses Linux and the Embedded Market GPL Violations and License Enforcement GNU GPL License Compliance With specific focus on Embedded Devices

FOSS Licenses Linux and the Embedded Market GPL Violations and License Enforcement GNU GPL License Compliance With specific focus on Embedded Devices

DocID: 1tI09 - View Document

Open Source / Content Licences before European Courts FOSDEM • Legal Issues DevRoom • 11 FebPhilippe LAURENT

Open Source / Content Licences before European Courts FOSDEM • Legal Issues DevRoom • 11 FebPhilippe LAURENT

DocID: 12YeV - View Document

news@UK The Newsletter of UKUUG, the UK’s Unix and Open Systems Users Group Published electronically at http://www.ukuug.org/newsletter/ Volume 15, Number 4

news@UK The Newsletter of UKUUG, the UK’s Unix and Open Systems Users Group Published electronically at http://www.ukuug.org/newsletter/ Volume 15, Number 4

DocID: Zvqt - View Document

Automotive Supply Chains with Built-In License Compliance How a Vision can become Reality  Claus-Peter Wiedemann

Automotive Supply Chains with Built-In License Compliance How a Vision can become Reality Claus-Peter Wiedemann

DocID: Qk8K - View Document

Fork and Ignore: Fighting a GPL Violation By Coding Instead Bradley M. Kuhn Friday 22 August 2014 This is a text version of the slides. The “full experience” web version is available online at:

Fork and Ignore: Fighting a GPL Violation By Coding Instead Bradley M. Kuhn Friday 22 August 2014 This is a text version of the slides. The “full experience” web version is available online at:

DocID: FfUL - View Document