2011
DOI: 10.7840/kics.2011.36b.1.29
|View full text |Cite
|
Sign up to set email alerts
|

Study on NFC Security Analysis and UICC Alternative Effect

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Therefore, DoS Attack and MITM (Man-in-theMiddle) Attack in NFC communication are close to impossible" [12]. However, entity authentication is not performed during the first communication between NFC devices.…”
Section: Security Threats Between Nfc Mobiles and Nfc Readersmentioning
confidence: 99%
“…Therefore, DoS Attack and MITM (Man-in-theMiddle) Attack in NFC communication are close to impossible" [12]. However, entity authentication is not performed during the first communication between NFC devices.…”
Section: Security Threats Between Nfc Mobiles and Nfc Readersmentioning
confidence: 99%
“…• Man-in-the-Middle Attack: Sun et al, stated, "The role of NFC is to support the physical properties of proximity communication. Therefore, DoS Attack and MITM (Man-in-the-Middle) Attack in NFC communication are close to impossible" [2]. However, entity authentication is not performed during the first communication between NFC devices.…”
Section: Security Threatmentioning
confidence: 99%