2013
DOI: 10.1016/j.aasri.2013.10.042
|View full text |Cite
|
Sign up to set email alerts
|

“Solutions for RFID Smart Tagged Card Security Vulnerabilities”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 3 publications
0
6
0
1
Order By: Relevance
“…[11]. Moreover, the use of RFID prevents sniffing or Eavesdropping, Spoofing, Cloning, Replay, Relay and Denial of Service Attacks are some of the security threats [12]. [10].…”
Section: B Radio-frequency Identification (Frid)mentioning
confidence: 99%
See 1 more Smart Citation
“…[11]. Moreover, the use of RFID prevents sniffing or Eavesdropping, Spoofing, Cloning, Replay, Relay and Denial of Service Attacks are some of the security threats [12]. [10].…”
Section: B Radio-frequency Identification (Frid)mentioning
confidence: 99%
“…It seems that a change of high social concern and high contribution services such as services with banks as opposite to groceries stores [20] have more impact on user's privacy issues when they use QR codes to access the business web sites. Moreover, results suggest that privacy issues when using QR code and [21] describes sniffing or Eavesdropping, Spoofing, Cloning, Replay, Relay and Denial of Service Attacks are some of the security threats to RFID technology. One possible methods being used as countermeasures to the security threats presented against RFID technology.…”
Section: B Radio-frequency Identification (Frid)mentioning
confidence: 99%
“…Hal ini membuat manajemen kampus yang mengolahnya memiliki sistem manajemen yang berbeda pada setiap fasilitas sarana dan prasarana yang dimiliki univeritas. sehingga setiap akses yang ada di universitas memiliki kartu akses yang berbeda (Williamson, 2013). Maka dari itu penelitian ini bertujuan untuk menyederhakan sistem manajemen di universitas.…”
Section: Penelitian Terkaitunclassified
“…Survey in [13], [14] examine and bring out several aspects related to low powered RF system security. Security threats to RF systems can be put into several classes [15], [16]; Sniffing (or Eavesdropping), Spoofing, Cloning, Replay, Relay, and Denial of Service attacks.…”
Section: Introductionmentioning
confidence: 99%