000725630 000__ 02557cam\a2200493Ii\4500 000725630 001__ 725630 000725630 005__ 20230306140649.0 000725630 006__ m\\\\\o\\d\\\\\\\\ 000725630 007__ cr\cn\nnnunnun 000725630 008__ 150213t20152015sz\a\\\\ob\\\\001\0\eng\d 000725630 019__ $$a908048976 000725630 020__ $$a9783319154886$$qelectronic book 000725630 020__ $$a3319154885$$qelectronic book 000725630 020__ $$z9783319154879 000725630 0247_ $$a10.1007/978-3-319-15488-6$$2doi 000725630 035__ $$aSP(OCoLC)ocn903357064 000725630 035__ $$aSP(OCoLC)903357064$$z(OCoLC)908048976 000725630 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dOCLCA$$dDKU$$dUPM$$dBTCTA$$dIDEBK$$dCOO$$dCDX$$dE7B$$dEBLCP$$dYDXCP 000725630 049__ $$aISEA 000725630 050_4 $$aTK6570.N43 000725630 08204 $$a621.3845/6$$223 000725630 1001_ $$aRoland, Michael,$$eauthor. 000725630 24510 $$aSecurity issues in mobile NFC devices$$h[electronic resource] /$$cMichael Roland. 000725630 2463_ $$aSecurity issues in mobile near field communication devices 000725630 264_1 $$aCham :$$bSpringer,$$c[2015] 000725630 264_4 $$c©2015 000725630 300__ $$a1 online resource (xviii, 185 pages) :$$billustrations. 000725630 336__ $$atext$$btxt$$2rdacontent 000725630 337__ $$acomputer$$bc$$2rdamedia 000725630 338__ $$aonline resource$$bcr$$2rdacarrier 000725630 4901_ $$aT-Labs Series in Telecommunication Services,$$x2192-2810 000725630 504__ $$aIncludes bibliographical references and index. 000725630 5050_ $$aIntroduction -- Basics -- Exemplary Use-Cases -- Related Work -- Tagging -- Card Emulation -- Software-based Relay Attacks on Existing Applications -- Summary and Outlook. 000725630 506__ $$aAccess limited to authorized users. 000725630 520__ $$aThis work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects. 000725630 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 18, 2015). 000725630 650_0 $$aNear-field communication$$xSecurity measures. 000725630 650_0 $$aSmartphones$$xSecurity measures. 000725630 77608 $$iPrint version:$$z9783319154879 000725630 830_0 $$aT-labs series in telecommunication services. 000725630 852__ $$bebk 000725630 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-15488-6$$zOnline Access$$91397441.1 000725630 909CO $$ooai:library.usi.edu:725630$$pGLOBAL_SET 000725630 980__ $$aEBOOK 000725630 980__ $$aBIB 000725630 982__ $$aEbook 000725630 983__ $$aOnline 000725630 994__ $$a92$$bISE