Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 76 publications
(44 citation statements)
references
References 13 publications
0
44
0
Order By: Relevance
“…Integrity codes use observation that attackers cannot easily change NFC transmitted '1' bits into a '0' and, hence, communication can be coded to detect tampering. Fingerprinting methods to detect counterfeits and cloned devices are proposed in [36,37].…”
Section: Zigbeementioning
confidence: 99%
“…Integrity codes use observation that attackers cannot easily change NFC transmitted '1' bits into a '0' and, hence, communication can be coded to detect tampering. Fingerprinting methods to detect counterfeits and cloned devices are proposed in [36,37].…”
Section: Zigbeementioning
confidence: 99%
“…In [12], minimum power responses measured at multiple frequencies are used as unique electronic fingerprint. The power is measured at the range from 860 MHz to 960 MHz in increments of 1 MHz.…”
Section: Related Workmentioning
confidence: 99%
“…Physical-layer fingerprinting (identification) of UHF RFID tags has been investigated in several works [21][22][23]34]. Periaswamy et al [22] studied physical-layer identification of UHF RFID tags as a mechanism to detect counterfeit tags.…”
Section: Rfid Fingerprinter Requirementsmentioning
confidence: 99%
“…Periaswamy et al [22] studied physical-layer identification of UHF RFID tags as a mechanism to detect counterfeit tags. The authors used the tag minimum power response measured at multiple frequencies as discriminant feature.…”
Section: Rfid Fingerprinter Requirementsmentioning
confidence: 99%