Login / Signup

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.

Alexei CzeskisKarl KoscherJoshua R. SmithTadayoshi Kohno
Published in: CCS (2008)
Keyphrases