Sign in

Preventing real-world relay attacks on contactless devices.

Martin HenzlPetr HanácekMatej Kacic
Published in: ICCST (2014)
Keyphrases
  • real world
  • wide range
  • data sets
  • mobile devices
  • synthetic data
  • smart card
  • data mining
  • smart phones
  • cooperative
  • countermeasures
  • case study
  • watermarking scheme