Nowadays, near field communication (NFC) has been implemented in many fields such as ticketing, public transport payment, credit cards and Wireless Local Area Network (WLAN) set up. In the near future, NFC is expected to replace credit cards in the electronic payment. Therefore, a security issue in NFC has become a crucial issue to be resolved. One of the critical security issues in NFC is key agreement. The weakness of current key agreement makes user privacy vulnerable to attack. To address that issue, this research proposes an enhanced algorithm to protect the user privacy in the NFC. The enhanced algorithm extends pseudonyms algorithm which has been implemented for resolving privacy protection problems in Vehicular ad hoc networks (VANE...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
© 2016 Published by Elsevier B.V. In this work, we describe a security solution that can be used to ...
In recent years, various mobile terminals equipped with NFC (Near Field Communication) have been rel...
In the recent years the NFC with the combination of smart devices has widened the utilization range ...
Recently, due to the introduction of NFC (Near Field Communication), it has become possible to make ...
Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling d...
The Internet of Things (IoT) aims to achieve the interconnection of all devices in our lives. Due to...
Click on the DOI link to access the article (may not be free).The near field communication (NFC) tec...
Recently, various mobile terminals equipped with NFC are released. However, The NFC security standar...
The Internet of Things (IoT) aims to achieve the interconnection of all devices in our lives. Due to...
Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchange...
Click on the DOI link to access the article (may not be free).Due to the popularity of the Near Fiel...
Near Field Communication (NFC) is a promising short dis-tance radio communication technology for man...
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol tha...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
© 2016 Published by Elsevier B.V. In this work, we describe a security solution that can be used to ...
In recent years, various mobile terminals equipped with NFC (Near Field Communication) have been rel...
In the recent years the NFC with the combination of smart devices has widened the utilization range ...
Recently, due to the introduction of NFC (Near Field Communication), it has become possible to make ...
Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling d...
The Internet of Things (IoT) aims to achieve the interconnection of all devices in our lives. Due to...
Click on the DOI link to access the article (may not be free).The near field communication (NFC) tec...
Recently, various mobile terminals equipped with NFC are released. However, The NFC security standar...
The Internet of Things (IoT) aims to achieve the interconnection of all devices in our lives. Due to...
Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchange...
Click on the DOI link to access the article (may not be free).Due to the popularity of the Near Fiel...
Near Field Communication (NFC) is a promising short dis-tance radio communication technology for man...
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol tha...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
© 2016 Published by Elsevier B.V. In this work, we describe a security solution that can be used to ...