Article Fingerprint
ReserarchID
OJZ1W
About-This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. The paper introduced an NFC specific key agreement mechanism, which provides cheap and fast secure key agreement. Key agreement techniques without authentication can be used to provide a standard secure channel. This resistance against Man-in-the-Middle attacks makes NFC an ideal method for secure pairing of devices. The paper lists some of threats, which are applicable to NFC, and describes solutions to protect against these threats.
Dr. Mohamed Mostafa Abd Allah. 1970. \u201cStrengths and Weaknesses of Near Field Communication (NFC) Technology\u201d. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 3): .
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 126
Country: Saudi Arabia
Subject: Uncategorized
Authors: Dr. Mohamed Mostafa Abd Allah (PhD/Dr. count: 1)
View Count (all-time): 97
Total Views (Real + Logic): 20602
Total Downloads (simulated): 10990
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
About-This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. The paper introduced an NFC specific key agreement mechanism, which provides cheap and fast secure key agreement. Key agreement techniques without authentication can be used to provide a standard secure channel. This resistance against Man-in-the-Middle attacks makes NFC an ideal method for secure pairing of devices. The paper lists some of threats, which are applicable to NFC, and describes solutions to protect against these threats.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.