|
|
|
|
LEADER |
02408nam a22004935i 4500 |
001 |
978-3-319-15488-6 |
003 |
DE-He213 |
005 |
20151204190702.0 |
007 |
cr nn 008mamaa |
008 |
150211s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319154886
|9 978-3-319-15488-6
|
024 |
7 |
|
|a 10.1007/978-3-319-15488-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Roland, Michael.
|e author.
|
245 |
1 |
0 |
|a Security Issues in Mobile NFC Devices
|h [electronic resource] /
|c by Michael Roland.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XVIII, 185 p. 44 illus., 17 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a T-Labs Series in Telecommunication Services,
|x 2192-2810
|
505 |
0 |
|
|a Introduction -- Basics -- Exemplary Use-Cases -- Related Work -- Tagging -- Card Emulation -- Software-based Relay Attacks on Existing Applications -- Summary and Outlook.
|
520 |
|
|
|a This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Security Science and Technology.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319154879
|
830 |
|
0 |
|a T-Labs Series in Telecommunication Services,
|x 2192-2810
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-15488-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|