Context-based co-presence detection techniques: A survey

M Conti, C Lal - Computers & Security, 2020 - Elsevier
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

Deep learning methods for device authentication using RF fingerprinting

D Huang, A Al-Hourani… - 2021 15th …, 2021 - ieeexplore.ieee.org
Radio Frequency (RF) fingerprinting is an emerging technology for advanced device
authentication. In this work, we investigate the feasibility of utilizing three different types of …

Evaluation of users' knowledge and concerns of biometric passport systems

T Habibu, ET Luhanga, AE Sam - Data, 2019 - mdpi.com
The increase in terrorism and identity fraud has forced governments worldwide to make a
combined effort to enhance the security of national borders. Biometric passports are the …

[HTML][HTML] “Internet of Smart Cards”: A pocket attacks scenario

L Sportiello - International Journal of Critical Infrastructure Protection, 2019 - Elsevier
Smart cards are secure devices used to store people sensitive data and to regulate
important operations like identity proofs and payment transactions. For years people have …

Detecting relay attacks on RFID communication systems using quantum bits

H Jannati, E Ardeshir-Larijani - Quantum Information Processing, 2016 - Springer
RFID systems became widespread in variety of applications because of their simplicity in
manufacturing and usability. In the province of critical infrastructure protection, RFID systems …

A survey on context-based co-presence detection techniques

M Conti, C Lal - arXiv preprint arXiv:1808.03320, 2018 - arxiv.org
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

Breaking anonymity of some recent lightweight RFID authentication protocols

K Baghery, B Abdolmaleki, S Khazaei, MR Aref - Wireless Networks, 2019 - Springer
Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are
ubiquitously found in various novel applications. These applications are usually in need of …

[PDF][PDF] Cybersecurity in implantable medical devices

CC Núñez, PP López, JME Tapiador - 2018 - e-archivo.uc3m.es
Abstract Implantable Medical Devices (IMDs) are electronic devices implanted within the
body to treat a medical condition, monitor the state or improve the functioning of some body …

Distance bounding protocol for RFID Systems

Y Zhou, J Zhou - Wireless Algorithms, Systems, and Applications: 11th …, 2016 - Springer
A secure mutual distance bounding (SMDB) protocol has been proposed, which employs a
combination of slow exchange, bit complement rapid exchange rule and final signature …

[引用][C] Machine Learning Method for Radio Frequency Identification

D Huang - 2023 - RMIT University Australia