A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Practical Experiences on NFC Relay Attacks with Android
[chapter]
2015
Lecture Notes in Computer Science
It operates in the 13.56MHz spectrum and supports data transfer rates of 106, 216, and 424 kbps. NFC defines three operation modes: peer-to-peer, read/write, and cardemulation mode. ...
We show an experiment proving its feasibility using off-the-shelf NFC-enabled Android devices (i.e., no custom firmware nor root required). ...
Similarly, Korak and Hutter [25] compared timing on relay attacks using different communication channels (e.g., Bluetooth, GRPS, or WiFi). ...
doi:10.1007/978-3-319-24837-0_6
fatcat:3ztzqv6tprf7jjytywrxfdue4u
The New Era of Digital Payments
[article]
2021
Zenodo
Since the digital age has arrived decades back and it's penetrating in to various industrial sectors with innovation and breath taking changes. ...
The outcome of the chapters would be beneficial for scholars, academicians and industrialists for keeping check points on the digital payment system. ...
Local festivals are used to promote digital payments by setting up demo stalls where knowledge about digital payment modes are provided. ...
doi:10.5281/zenodo.5748642
fatcat:i4yyrbtxgrbxpneql2aferalpi
Publishing Council: Intelligent Decision Support for Architecture and Integration of Next Generation Enterprises
unpublished
This paper describes an intelligent decision support environment that uses patterns, best practices, inferences, and collaboration for enterprise architecture and integration projects. ...
Architectures and integration of emerging next generation enterprises (NGEs) require a series of complex decisions. ...
We thank Pedro Isaias who motivated us to extend the original conference paper and to submit it for a special issue of the Informatica Journal. ...
fatcat:qkobpzh4xzayljby6c5yxuusua
Dagstuhl Reports, Volume 8, Issue 8, August 2018, Complete Issue
[article]
2019
We thank Dagstuhl for their extensive support, and all the participants who contributed.
Participants ...
characteristics. ...
Diversity and linkage of fingerprints. ...
doi:10.4230/dagrep.8.8
fatcat:fqrend6usnhefgg745ixiqw6ue
Detecting cloud virtual network isolation security for data leakage
2019
As a major contribution to research, this is the first empirical work to use a Deep Dive approach and a penetration testing methodology applied to both CloudStack and OpenStack to demonstrate cloud network ...
This research is one of the first empirical building blocks in the field and gives future researchers the basis for building their research on top of the presented methodology and results and for proposing ...
And what are the characteristics of the data leaked? ...
doi:10.17630/10023-17524
fatcat:xurwm6paavctjhcuacqfzwtqmm
MMEDIA 2012 The Fourth International Conferences on Advances in Multimedia MMEDIA 2012 PROGRAM COMMITTEE MMEDIA Advisory Committee MMEDIA 2012 Technical Program Committee
unpublished
We are convinced that the participants found the event useful and communications very open. We also hope the attendees enjoyed their stay in the French Alps. ...
While the volume of information may be useful, it creates new challenges for information retrieval, identification, understanding, selection, etc. ...
"SCADA system for control and measurement of process in real time". ...
fatcat:krhwyvwrhzdynmouyuzjiq65ki
Global Campus Human Rights Journal, Volume 3 No 2
2020
The first part provides a special focus on 'technology and human rights', an area of growing interest and concern. ...
from their respective Master's programmes in Human Rights and Democracy. ...
They also identify and discuss crucial developments in this context such the criminalisation of search and rescue NGOs, the transfer of search and rescue responsibilities to third countries, and the outsourcing ...
doi:10.25330/1342
fatcat:3vfp43db5bd73jivf3z2ra6go4