Nothing Special   »   [go: up one dir, main page]

Alshehri et al., 2015 - Google Patents

A formal framework for security analysis of NFC mobile coupon protocols

Alshehri et al., 2015

Document ID
7382620810165925649
Author
Alshehri A
Schneider S
Publication year
Publication venue
Journal of Computer Security

External Links

Snippet

Abstract Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a …
Continue reading at content.iospress.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Similar Documents

Publication Publication Date Title
Gope et al. Lightweight and privacy-preserving two-factor authentication scheme for IoT devices
Jiang et al. Three-factor authentication protocol using physical unclonable function for IoV
Das et al. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
Dimitriou Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
Khan et al. [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server
Brelurut et al. Survey of distance bounding protocols and threats
Fischlin et al. Subtle kinks in distance-bounding: an analysis of prominent protocols
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
Ahamad et al. A secure NFC mobile payment protocol based on biometrics with formal verification
Alzuwaini et al. An Efficient Mechanism to Prevent the Phishing Attacks.
Alshehri et al. Formal security analysis of NFC M-coupon protocols using Casper/FDR
Resende et al. PUF-based mutual multifactor entity and transaction authentication for secure banking
Zahednejad et al. A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics
Lounis et al. More lessons: Analysis of PUF-based authentication protocols for IoT
Mir et al. Decentralized, Privacy‐Preserving, Single Sign‐On
Eldefrawy et al. Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone
Aiash A formal analysis of authentication protocols for mobile devices in next generation networks
Srinivas et al. An authentication framework for roaming service in global mobility networks
Alshehri et al. A formal framework for security analysis of NFC mobile coupon protocols
Alshehri NFC mobile coupon protocols: developing, formal security modelling and analysis, and addressing relay attack
Alshehri et al. Formally defining NFC M-coupon requirements, with a case study
Vaudenay On privacy for RFID
Gerault Security analysis of contactless communication protocols
Das et al. A Robust and Effective Smart‐Card‐Based Remote User Authentication Mechanism Using Hash Function
Alshehri et al. Formal security analysis and improvement of a hash-based NFC m-coupon protocol