|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-15488-6 |
003 |
DE-He213 |
005 |
20220119050011.0 |
007 |
cr nn 008mamaa |
008 |
150211s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319154886
|9 978-3-319-15488-6
|
024 |
7 |
|
|a 10.1007/978-3-319-15488-6
|2 doi
|
050 |
|
4 |
|a TK5101-5105.9
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Roland, Michael.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Security Issues in Mobile NFC Devices
|h [electronic resource] /
|c by Michael Roland.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XVIII, 185 p. 44 illus., 17 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a T-Labs Series in Telecommunication Services,
|x 2192-2829
|
505 |
0 |
|
|a Introduction -- Basics -- Exemplary Use-Cases -- Related Work -- Tagging -- Card Emulation -- Software-based Relay Attacks on Existing Applications -- Summary and Outlook.
|
520 |
|
|
|a This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Security systems.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319154893
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319154879
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319368016
|
830 |
|
0 |
|a T-Labs Series in Telecommunication Services,
|x 2192-2829
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-15488-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|