Secure Inductive-Coupled Near Field Communication at Physical Layer
نویسندگان
چکیده
منابع مشابه
Secure Authentication through a near Field Communication in Asymmetric Cryptography
This paper presents the design and implementation of a complete near-field communication (NFC) tag system that supports highsecurity features. The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56-MHz radio-frequency identification (RFID) front-end, a digital part that includes a tiny (programmable) 8-b microcontroller, a framing logic for...
متن کاملNear Field Communication (NFC)
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches. Near Field Communication (NFC) is one of the short range wireless communication technologies based on RFID. NFC provides secure and inherent communication between el...
متن کاملNear Field Communication in Smartphones
Near Field Communication (NFC) is an emerging wireless short-range communication technology that is based on existing standards of the Radio Frequency Identification (RFID) infrastructure. In combination with NFC-capable smartphones it enables intuitive application scenarios for contactless transactions, in particular services for mobile payment and over-theair ticketing. The intention of this ...
متن کاملevaluation of coupled- shear walls subjected to near-field earthquakes
coupled -shear walls are one of lateral load resisting systems in high and medium rise reinforced concrete buildings. the lateral structural response is exactly dependents on the shear walls behavior; therefore these elements must response well whenundergodifferent load conditions. the structures located in near-source region behave differently compared to those in near-source sites when subjec...
متن کاملat the Physical Layer
1053-5888/13/$31.00©2013IEEE ireless comm u n i c a t i o n s systems are particularly vulnerable to security attacks because of the inherent openness of the transmission medium. In this article, we focus on guaranteeing confidentiality against eavesdropping attacks where an unauthorized entity aims to intercept an ongoing wireless communication, and we provide a comprehensive summary of recent...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2018
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2018.2832983