Login / Signup

On the power of active relay attacks using custom-made proxies.

Thomas KorakMichael Hutter
Published in: IEEE RFID (2014)
Keyphrases