Essays about: "near-field communication"
Showing result 1 - 5 of 42 essays containing the words near-field communication.
-
1. Integrated NFC in product packaging : How the use of integrated Near Field Communication in product packaging can change the user experience for Generation Z and enable stronger relationships with brands
University essay fromAbstract : Over the past decades, technological advancements have made everyday objects smart, and naturally, these developments have reached the packaging industry too. Packaging equipped with sensors and chips can provide new experiences to its customers and one of the technologies that has shown its potential to contribute to this is Near Field Communication (NFC). READ MORE
-
2. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE
-
3. Increasing the Crossover Levels of Beams in Geodesic Luneburg Lens Antennas
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The new and forthcoming generation of mobile networks intend to operate at considerably higher frequencies than the previous systems. This lift in frequency of operation alleviates today’s communication systems’ crowded bandwidth and allows for faster data rates than previously possible. READ MORE
-
4. Near Field Communication Security concerns & applicable security in Android
University essay from Högskolan Kristianstad/Fakulteten för naturvetenskapAbstract : Near Field Communication (NFC) is being used more frequent in smart devices, this raises security concerns whether the users information is secure from attackers. The thesis examines the threats that NFC on Android smartphones are exposed to, its countermeasures, as well as existing protocols that ensures the integrity and confidentiality of the users data. READ MORE
-
5. Far Field Electromagnetic Side Channel Analysis of AES
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE