Login / Signup
Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks.
Wolfgang Issovits
Michael Hutter
Published in:
RFID-TA (2011)
Keyphrases
</>
iso iec
cryptographic protocols
international standard
security protocols
information security
quality evaluation
software process
reference model
maturity model
software quality
artificial intelligence