Articles with "scbf exploiting" as a keyword



Photo by scottwebb from unsplash

SCBF: Exploiting a Collision for Authentication in Backscatter Networks

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2017.2676773

Abstract: Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application… read more here.

Keywords: backscatter networks; authentication; security; collision ... See more keywords