On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
Context-based co-presence detection techniques: A survey
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …
detection techniques. These techniques are heavily used for improving security and usability …
A survey on context-based co-presence detection techniques
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …
detection techniques. These techniques are heavily used for improving security and usability …
[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments
C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …
acquire the ability to monitor and act upon their environment–is anticipated to benefit …