Securing Deployed RFIDs by Randomizing the Modulation and the Channel
RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. One...
Main Authors: | , , , |
---|---|
Other Authors: | |
Published: |
2013
|
Online Access: | http://hdl.handle.net/1721.1/76260 |