Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a newspaper or a smart poster and redeemed afterwards. The NFC-based mobile coupon (M-coupon) is a cryptographically secured electronic message with some value stored at user's mobile. The M-coupon requires secure issuing and cashing (redeeming). Uncontrolled copies of the M-coupons would cause losses for a company and damage its reputation. The main goal of this thesis is to enhance the security of NFC mobile coupon protocols. In order to address the NFC M-coupon threats, there are specific a...
[[abstract]]The NFC (Near Field Communication) became a popular short distance wireless communicatio...
Near Field Communication (NFC) is a set of standards, which allows two devices to transfer messages ...
AbstractIn this work, we describe a security solution that can be used to securely establish mobile ...
Near field communication (NFC) is a standard-based, radio frequency (RF), wireless communication tec...
Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged...
Abstract—Near field communication (NFC) is a standard-based, radio frequency (RF), wireless communic...
[[abstract]]©2008 BAI-Coupons are one of the ways to increase customer retention and loyalty for a r...
Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling d...
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol tha...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
Near field communication (NFC) is a family of radio frequency identification (RFID) that used wirel...
NFC(near field communication) technology is a kind of technology to provide close RFID communication...
© 2016 Published by Elsevier B.V. In this work, we describe a security solution that can be used to ...
Near Field Communication (NFC) is a promising communication technology used in smart mobile devices....
[[abstract]]The NFC (Near Field Communication) became a popular short distance wireless communicatio...
Near Field Communication (NFC) is a set of standards, which allows two devices to transfer messages ...
AbstractIn this work, we describe a security solution that can be used to securely establish mobile ...
Near field communication (NFC) is a standard-based, radio frequency (RF), wireless communication tec...
Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged...
Abstract—Near field communication (NFC) is a standard-based, radio frequency (RF), wireless communic...
[[abstract]]©2008 BAI-Coupons are one of the ways to increase customer retention and loyalty for a r...
Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling d...
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol tha...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NF...
Near field communication (NFC) is a family of radio frequency identification (RFID) that used wirel...
NFC(near field communication) technology is a kind of technology to provide close RFID communication...
© 2016 Published by Elsevier B.V. In this work, we describe a security solution that can be used to ...
Near Field Communication (NFC) is a promising communication technology used in smart mobile devices....
[[abstract]]The NFC (Near Field Communication) became a popular short distance wireless communicatio...
Near Field Communication (NFC) is a set of standards, which allows two devices to transfer messages ...
AbstractIn this work, we describe a security solution that can be used to securely establish mobile ...