Alshehri et al., 2015 - Google Patents
A formal framework for security analysis of NFC mobile coupon protocolsAlshehri et al., 2015
- Document ID
- 7382620810165925649
- Author
- Alshehri A
- Schneider S
- Publication year
- Publication venue
- Journal of Computer Security
External Links
Snippet
Abstract Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a …
- 238000004458 analytical method 0 title abstract description 42
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gope et al. | Lightweight and privacy-preserving two-factor authentication scheme for IoT devices | |
Jiang et al. | Three-factor authentication protocol using physical unclonable function for IoV | |
Das et al. | An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system | |
Dimitriou | Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags | |
Khan et al. | [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server | |
Brelurut et al. | Survey of distance bounding protocols and threats | |
Fischlin et al. | Subtle kinks in distance-bounding: an analysis of prominent protocols | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
Ahamad et al. | A secure NFC mobile payment protocol based on biometrics with formal verification | |
Alzuwaini et al. | An Efficient Mechanism to Prevent the Phishing Attacks. | |
Alshehri et al. | Formal security analysis of NFC M-coupon protocols using Casper/FDR | |
Resende et al. | PUF-based mutual multifactor entity and transaction authentication for secure banking | |
Zahednejad et al. | A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics | |
Lounis et al. | More lessons: Analysis of PUF-based authentication protocols for IoT | |
Mir et al. | Decentralized, Privacy‐Preserving, Single Sign‐On | |
Eldefrawy et al. | Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone | |
Aiash | A formal analysis of authentication protocols for mobile devices in next generation networks | |
Srinivas et al. | An authentication framework for roaming service in global mobility networks | |
Alshehri et al. | A formal framework for security analysis of NFC mobile coupon protocols | |
Alshehri | NFC mobile coupon protocols: developing, formal security modelling and analysis, and addressing relay attack | |
Alshehri et al. | Formally defining NFC M-coupon requirements, with a case study | |
Vaudenay | On privacy for RFID | |
Gerault | Security analysis of contactless communication protocols | |
Das et al. | A Robust and Effective Smart‐Card‐Based Remote User Authentication Mechanism Using Hash Function | |
Alshehri et al. | Formal security analysis and improvement of a hash-based NFC m-coupon protocol |