7 Hits in 9.0 sec

Practical Experiences on NFC Relay Attacks with Android [chapter]

José Vila, Ricardo J. Rodríguez
2015 Lecture Notes in Computer Science  
It operates in the 13.56MHz spectrum and supports data transfer rates of 106, 216, and 424 kbps. NFC defines three operation modes: peer-to-peer, read/write, and cardemulation mode.  ...  We show an experiment proving its feasibility using off-the-shelf NFC-enabled Android devices (i.e., no custom firmware nor root required).  ...  Similarly, Korak and Hutter [25] compared timing on relay attacks using different communication channels (e.g., Bluetooth, GRPS, or WiFi).  ... 
doi:10.1007/978-3-319-24837-0_6 fatcat:3ztzqv6tprf7jjytywrxfdue4u

The New Era of Digital Payments [article]

Dr S.C.B. Samuel Anbu Selvan
2021 Zenodo  
Since the digital age has arrived decades back and it's penetrating in to various industrial sectors with innovation and breath taking changes.  ...  The outcome of the chapters would be beneficial for scholars, academicians and industrialists for keeping check points on the digital payment system.  ...  Local festivals are used to promote digital payments by setting up demo stalls where knowledge about digital payment modes are provided.  ... 
doi:10.5281/zenodo.5748642 fatcat:i4yyrbtxgrbxpneql2aferalpi

Publishing Council: Intelligent Decision Support for Architecture and Integration of Next Generation Enterprises

Anton Železnikar, Ciril Baškovič, Cene Bavec, Matjan Krisper, Vladislav Rajkovič, Tatjana Welzer, Maggie Mcpherson, Pedro Isaias, Amjad Umar
This paper describes an intelligent decision support environment that uses patterns, best practices, inferences, and collaboration for enterprise architecture and integration projects.  ...  Architectures and integration of emerging next generation enterprises (NGEs) require a series of complex decisions.  ...  We thank Pedro Isaias who motivated us to extend the original conference paper and to submit it for a special issue of the Informatica Journal.  ... 

Dagstuhl Reports, Volume 8, Issue 8, August 2018, Complete Issue [article]

We thank Dagstuhl for their extensive support, and all the participants who contributed. Participants  ...  characteristics.  ...  Diversity and linkage of fingerprints.  ... 
doi:10.4230/dagrep.8.8 fatcat:fqrend6usnhefgg745ixiqw6ue

Detecting cloud virtual network isolation security for data leakage

Haifa Mohamed Al Nasseri, Ishbel Mary Macdonald Duncan
As a major contribution to research, this is the first empirical work to use a Deep Dive approach and a penetration testing methodology applied to both CloudStack and OpenStack to demonstrate cloud network  ...  This research is one of the first empirical building blocks in the field and gives future researchers the basis for building their research on top of the presented methodology and results and for proposing  ...  And what are the characteristics of the data leaked?  ... 
doi:10.17630/10023-17524 fatcat:xurwm6paavctjhcuacqfzwtqmm

MMEDIA 2012 The Fourth International Conferences on Advances in Multimedia MMEDIA 2012 PROGRAM COMMITTEE MMEDIA Advisory Committee MMEDIA 2012 Technical Program Committee

Chamonix, Mont Blanc, France, David Newell, Dan Dumitru, Burdescu, Philip Davies, Poole College, Jean-Claude Moissinac, Telecom Paristech, France, Patrice Alface (+81 others)
We are convinced that the participants found the event useful and communications very open. We also hope the attendees enjoyed their stay in the French Alps.  ...  While the volume of information may be useful, it creates new challenges for information retrieval, identification, understanding, selection, etc.  ...  "SCADA system for control and measurement of process in real time".  ... 

Global Campus Human Rights Journal, Volume 3 No 2

[...], University, My
The first part provides a special focus on 'technology and human rights', an area of growing interest and concern.  ...  from their respective Master's programmes in Human Rights and Democracy.  ...  They also identify and discuss crucial developments in this context such the criminalisation of search and rescue NGOs, the transfer of search and rescue responsibilities to third countries, and the outsourcing  ... 
doi:10.25330/1342 fatcat:3vfp43db5bd73jivf3z2ra6go4