A taxonomy of various attacks on smart card–based applications and countermeasures

BB Gupta, M Quamara - Concurrency and Computation …, 2021 - Wiley Online Library
Deployment of smart card–based applications is becoming prevalent these days. Security of
these applications depends upon the nature of underlying hardware and software platforms …

[图书][B] Smart Card Security: Applications, Attacks, and Countermeasures

BB Gupta, M Quamara - 2019 - taylorfrancis.com
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of
smart card technology and explores different security attacks and countermeasures …

Service layer security architecture for iot using biometric authentication and cryptography technique

SK Sharma, B Khuntia - … System Design: Proceedings of Intelligent System …, 2021 - Springer
Data security and authentication mechanism is a very challenging job for smart devices. And
more ever IOT is suffering with login and verification process. Here in our paper, we have …

[PDF][PDF] SE-H: Secure and efficient hash protocol for RFID system

S Nashwan - … Journal of Communication Networks and Information …, 2017 - researchgate.net
The Radio Frequency Identification (RFID) systems are suffered from the growing of security
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …

[PDF][PDF] A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone.

S Chabbi, R Boudour… - Ingénierie des Systèmes d' …, 2020 - researchgate.net
Accepted: 26 February 2020 NFC (Near Field Communication) is a radio frequency wireless
communication technology for less distance (less than 10cm). It operates at a frequency of …

[PDF][PDF] Biometric based RFID tag mutual authentication protocol defending against illegitimate access

K Srivastava, AK Awasthi, RC Mittal - Malaya Journal of …, 2018 - malayajournal.org
This research paper focuses on structuring an RFID Protocol in which the answer to the
question “Am I really the person who is accessing the resources” will be solved by …

A set of efficient privacy protection enforcing lightweight authentication protocols for low-cost rfid tags

PF Bonnefoi, P Dusart, D Sauveron… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Providing security and privacy protection in Radio Frequency IDentification (RFID) tags is a
challenging task due to their highly constrained resources. Because tags cannot support …

Problèmes de sécurité dans les systèmes embarqués

N CHIKOUCHE - 2016 - thesis.univ-biskra.dz
Les systèmes d'identification par radiofréquence (RFID) sont des systèmes embarqués qui
ont connu des développements rapides dans les dernières années. Ces systèmes sont …

[PDF][PDF] Combined RFID-Biometric based MIS forStudent Information

P Nikam, B Ahuja, M Deshmukh - Citeseer
RFID (Radio Frequency Identifier) and Biometric now a days are one of the most popular
technologies in use today. This paper focuses on creating a MIS (Management Information S …

[PDF][PDF] Sécurité et optimisation des applications NFC

C Samir - 1955 - biblio.univ-annaba.dz
Au cours des dernières années, les technologies de communication sans contact sont en
évolution progressive et sont devenues de plus en de plus importantes en raison de leurs …