Article Fingerprint
ReserarchID
OJZ1W
About-This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. The paper introduced an NFC specific key agreement mechanism, which provides cheap and fast secure key agreement. Key agreement techniques without authentication can be used to provide a standard secure channel. This resistance against Man-in-the-Middle attacks makes NFC an ideal method for secure pairing of devices. The paper lists some of threats, which are applicable to NFC, and describes solutions to protect against these threats.
Dr. Mohamed Mostafa Abd Allah. 1970. \u201cStrengths and Weaknesses of Near Field Communication (NFC) Technology\u201d. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 3).
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 126
Country: Saudi Arabia
Subject: Uncategorized
Authors: Dr. Mohamed Mostafa Abd Allah (PhD/Dr. count: 1)
View Count (all-time): 109
Total Views (Real + Logic): 20643
Total Downloads (simulated): 11023
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
This study aims to comprehensively analyse the complex interplay between
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.