منابع مشابه
Applying Asynchronous Circuits in Contactless Smart Cards
We have designed an asynchronous chip for contactless smart cards. Asynchronous circuits have two power properties that make them very suitable for contactless devices: low average power and small current peaks. The fact that asynchronous circuits operate over a wide range of the supply voltage, while automatically adapting their speed, has been used to obtain a circuit that is very resilient t...
متن کاملRange Extension Attacks on Contactless Smart Cards
The security of many near-field RFID systems such as credit cards, access control, e-passports, and e-voting, relies on the assumption that the tag holder is in close proximity to the reader. This assumption should be reasonable due to the fact that the nominal operation range of the RFID tag is only few centimeters. In this work we demonstrate a range extension setup which breaks this proximit...
متن کاملAn Access Management System Using Contactless Cards
This article describes the ESTAccess project implementation, whose goal is to control and track the accesses of students and teachers to classrooms using a contactless ID card (Mifare-classic). The hardware component is composed by an Electronic Door Lock (EDL) and an Access-Point (AP). The software component is composed by firmware in the EDL, a web interface, a database (DB) and a Java applic...
متن کاملSecurity Issues with Contactless Bank Cards
Contactless bank cards have been issued steadily to banking customers over the past four years and this trend has continued to grow rapidly more recently. We want to highlight a list of security issues as well as privacy threats to be concerned with when using such contactless bank cards. Further advances in smartphone technology applications can lead to new threats in relation to contactless b...
متن کاملSide - Channel Monitoring of Contactless Java Cards
Smart cards are small, portable, tamper-resistant computers used in securitysensitive applications ranging from identi_cation and access control to payment systems. Side-channel attacks, which use clues from timing, power consumption, or even electromagnetic (EM) signals, can compromise the security of these devices and have been an active research area since 1996. Newer contactless” cards comm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Banking, Accounting and Finance
سال: 2012
ISSN: 1755-3830,1755-3849
DOI: 10.1504/ijbaaf.2012.051590