Comments on Several Recent Secure NFC Studies
碩士 === 南華大學 === 資訊管理學系 === 105 === The NFC technology has a wide applications in the real life such as, electronic payments, access cards, traffic tickets, and so on. Although, the NFC payment scheme is easy to install and use, and has become popular, it may incur usage risk. Hence, the security i...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/6rzb93 |
id |
ndltd-TW-105NHU00396007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NHU003960072019-05-15T23:09:59Z http://ndltd.ncl.edu.tw/handle/6rzb93 Comments on Several Recent Secure NFC Studies 最近幾個NFC研究系統的評論 HUANG, SU-CHIN 黃素卿 碩士 南華大學 資訊管理學系 105 The NFC technology has a wide applications in the real life such as, electronic payments, access cards, traffic tickets, and so on. Although, the NFC payment scheme is easy to install and use, and has become popular, it may incur usage risk. Hence, the security issue is particularly important. To ensure the correct transaction process, this study first reads several recent schemes relating to NFC security issues. Then, we explore the NFC security issues of these proposed protocols by way of examining the ten security requirements for a smart card on authentication system insisted in Liao et al’s article and by checking the parallel session attack described in Modern Cryptography of Mao’s book. After analysis, we found their the weaknesses and further proposed amendments to them, respectively. CHOU, JUE-SAM 周志賢 2017 學位論文 ; thesis 12 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 南華大學 === 資訊管理學系 === 105 === The NFC technology has a wide applications in the real life such as, electronic payments, access cards, traffic tickets, and so on. Although, the NFC payment scheme is easy to install and use, and has become popular, it may incur usage risk. Hence, the security issue is particularly important. To ensure the correct transaction process, this study first reads several recent schemes relating to NFC security issues. Then, we explore the NFC security issues of these proposed protocols by way of examining the ten security requirements for a smart card on authentication system insisted in Liao et al’s article and by checking the parallel session attack described in Modern Cryptography of Mao’s book. After analysis, we found their the weaknesses and further proposed amendments to them, respectively.
|
author2 |
CHOU, JUE-SAM |
author_facet |
CHOU, JUE-SAM HUANG, SU-CHIN 黃素卿 |
author |
HUANG, SU-CHIN 黃素卿 |
spellingShingle |
HUANG, SU-CHIN 黃素卿 Comments on Several Recent Secure NFC Studies |
author_sort |
HUANG, SU-CHIN |
title |
Comments on Several Recent Secure NFC Studies |
title_short |
Comments on Several Recent Secure NFC Studies |
title_full |
Comments on Several Recent Secure NFC Studies |
title_fullStr |
Comments on Several Recent Secure NFC Studies |
title_full_unstemmed |
Comments on Several Recent Secure NFC Studies |
title_sort |
comments on several recent secure nfc studies |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/6rzb93 |
work_keys_str_mv |
AT huangsuchin commentsonseveralrecentsecurenfcstudies AT huángsùqīng commentsonseveralrecentsecurenfcstudies AT huangsuchin zuìjìnjǐgènfcyánjiūxìtǒngdepínglùn AT huángsùqīng zuìjìnjǐgènfcyánjiūxìtǒngdepínglùn |
_version_ |
1719142502636716032 |