Picking Virtual Pockets using Relay Attacks on Contactless Smartcard.
Ziv KfirAvishai WoolPublished in: SecureComm (2005)
Keyphrases
- smart card
- java card
- security mechanisms
- remote user authentication scheme
- power analysis
- information security
- countermeasures
- security requirements
- secret key
- digital signature
- security analysis
- authentication scheme
- computer security
- security protocols
- authentication protocol
- sensitive data
- base station
- fingerprint authentication
- secure communication
- communication networks