Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the authentication process, it can reduce the number of message transmission in the authentication process, improve the transmission efficiency, enhance the confidentiality, ...
Aug 16, 2021
The protocol can protect user's privacy and against im- personation attack, but NFC device requires additional costs for storage and computational efficiency ...
An improved NFC-based privacy protection protocol is proposed to protect user's privacy in NFC application and Chebyshev-map and certificateless public key ...
An improved NFC-based privacy protection protocol is proposed to protect user's privacy in NFC application. In this paper, user's privacy is protected by ...
An improved NFC-based privacy protection protocol is proposed to protect user's privacy in NFC application. In this paper, user's privacy is protected by ...
Aug 16, 2021 · Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric ...
In this paper, an express delivery system based on the NFC (Near Field Communication) technology and cryptographic protocols is proposed. Secure NFC tags ...
In the main section, this work examines the security and safety risks of NFC, summarizes built-in measures regarding security and safety and also suggests a ...
In this paper, we have introduced a new protocol for NFC mobile payment, which improves the GSM authentication protocol due to the existence of symmetric ...
The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the ...