Question description

Analysis and Optimization to an
NFC Security Authentication Algorithm Based on Hash Functions
A secure cloud of electronic keys for NFC locks securely controlled by
NFC smartphones
Prospective Cryptography in NFC with the Lightweight Block Encryption
Algorithm LEA
Cloud of secure elements:
An infrastructure for the trust of mobile NFC serviceOptimized Conditional Privacy Preservation
Protocol for NFC Applications using Genetic Algorithm

Published by
Essays Scribe
View all posts