Login / Signup

Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks.

Wolfgang IssovitsMichael Hutter
Published in: RFID-TA (2011)
Keyphrases
  • iso iec
  • cryptographic protocols
  • international standard
  • security protocols
  • information security
  • quality evaluation
  • software process
  • reference model
  • maturity model
  • software quality
  • artificial intelligence