Hacking iButtons, pp.27-30, 2010. ,
Don???t Push It: Breaking iButton Security, Foundations and Practice of Security, pp.369-387, 2014. ,
DOI : 10.1007/978-3-319-05302-8_23
Dismantling iClass and iClass Elite, Computer Security -ESORICS 2012, pp.697-715978, 2012. ,
DOI : 10.1007/978-3-642-33167-1_40
URL : http://www.cs.ru.nl/%7Erverdult/Dismantling_iClass_and_iClass_Elite_Poster-USENIX_2012.pdf
Can you really trust hardware? Exploring security problems in hardware devices, 2005. ,
A practical relay attack on ISO 14443 proximity cards, Tech. rep, 2005. ,
Practical attacks on proximity identification systems, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.6-333, 2006. ,
DOI : 10.1109/SP.2006.30
Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks, 2011 IEEE International Conference on RFID-Technologies and Applications, pp.335-342, 2011. ,
DOI : 10.1109/RFID-TA.2011.6068658
A Practical Attack on the MIFARE Classic, Smart Card Research and Advanced Applications, pp.267-282, 2008. ,
DOI : 10.1007/11908739_11
Unique (EM4001) RFID emulator, 2007. ,
Software methods to achieve robust 1-Wire communication in iButton applications, p.159, 2008. ,
Classifying RFID attacks and defenses, Information Systems Frontiers, vol.7, issue.7, pp.491-505, 2010. ,
DOI : 10.1007/s10796-009-9210-z
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World, Cryptographic Hardware and Embedded Systems -CHES 2011, pp.207-222, 2011. ,
DOI : 10.1007/978-3-642-23951-9_14
Platform independent Near Field Communication (NFC) library. https, 2017. ,
Gone in 360 seconds: Hijacking with Hitag2, Proceedings of the 21st USENIX Conference on Security Symposium. pp. 37?37. Security'12, USENIX Association, 2012. ,
A Toolbox for RFID Protocol Analysis, 2012 Fourth International EURASIP Workshop on RFID Technology, pp.27-34, 2012. ,
DOI : 10.1109/RFID.2012.19