Attacking ECDSA-Enabled RFID Devices.
Michael HutterMarcel MedwedDaniel M. HeinJohannes WolkerstorferPublished in: ACNS (2009)
Keyphrases
- rfid tags
- rfid reader
- mobile devices
- smart card
- data collection
- low cost
- radio frequency identification
- mobile phone
- rfid technology
- supply chain
- multimedia
- lightweight
- databases
- genetic algorithm
- information security
- elliptic curve
- intelligent environments
- cost effective
- embedded devices
- electronic devices
- smart phones
- embedded systems
- website
- information systems
- data mining
- neural network