Author of the publication

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.

, , , and . IACR Cryptology ePrint Archive, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking the Smart Card Technology., and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 221-232. Springer, (2014)Verifying Software Integrity in Embedded Systems: A Side Channel Approach., , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 261-280. Springer, (2014)Smart Cards for Banking and Finance., and . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy., , and . CoRR, (2018)An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks., , , , , and . CoRR, (2016)A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement., , , and . IEEE Trans. Ind. Informatics, 16 (1): 691-702 (2020)Attacking smart card systems: Theory and practice., , , , and . Inf. Secur. Tech. Rep., 14 (2): 46-56 (2009)Firewall Mechanism in a User Centric Smart Card Ownership Model., , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 118-132. Springer, (2010)Secure and Trusted Application Execution on Embedded Devices., , and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 3-24. Springer, (2015)EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs., , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 75-92. Springer, (2017)