Subject
Computer Networks and Communications
Reference30 articles.
1. A survey of applications and requirements of unique identification systems and RFID techniques;Ilie-Zudor;Comput. Ind.,2011
2. Security analysis of a cryptographically-enabled RFID device;Bono,2005
3. Dismantling MIFARE classic;Garcia,2008
4. Breaking mifare DESFire MF3ICD40: Power analysis and templates in the real world;Oswald,2011
5. Side-channel attack on a protected RFID card;Xu;IEEE Access,2018
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design of Anomaly Detection Algorithm for Intelligent Data Acquisition Terminal of Internet of Things Based on Deep Learning;2023 International Conference on Internet of Things, Robotics and Distributed Computing (ICIRDC);2023-12-29
2. Secure Self Payment and Monitoring Service Laundry using RFID with SHA-3 and AES 128;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22
3. ITAR: A Method for Indoor RFID Trajectory Automatic Recovery;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022
4. Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022