Essays about: "nfc security"
Showing result 1 - 5 of 17 essays containing the words nfc security.
-
1. Multiplexing NFC Antennas : An evaluation of the technique and its limitations
University essay from Jönköping University/JTH, Avdelningen för datavetenskapAbstract : Introduction This study aims to investigate the possibility of driving multiple NFC antennas with a single NFC-controller by using a multiplexer. An artifact was developed and experiments were conducted in order to evaluate the design choice and in addition, to observe the impact of a multiplexer in an NFC system with respect to the number of successful tag detections, bit error rate (BER), the utilization of automatic antenna tuning (AAT) and the physical distance to the NFC tag. READ MORE
-
2. Integrity and Security Considerations of Transparency and Traceability : an Exploratory Case Study of Traceability Validation Systems
University essay from Högskolan i Borås/Akademin för textil, teknik och ekonomiAbstract : Background: In recent years, unfair and unsafe working conditions have been reported, raising concerns among stakeholders and end-users. The demand for fashion brands to take further responsibility for social sustainability and transparency has increased. READ MORE
-
3. Facial Match : A step towards winning the battle against the fraudsters
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Identity fraud is a severe and ruthless crime, regardless of leasing a car insomeone else’s name or illegitimately getting a loan from a bank. The protection depends strongly on technical development to further increase the safetyof ID checking.This project aims to design an extra security ID checking on top of humanobservation. READ MORE
-
4. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE
-
5. Representing uncertainty analyses : Proposing guidelines for the design and presentation of representations of uncertainty analyses for position estimations in crime scene visualizations
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : At the Swedish National Forensic Centre [Nationellt Forensiskt Centrum] (NFC) 3D-models are being used to document crime scenes, and visualizations based on 3D-models are being used in court. In addition to this, 3D-models of crime scenes allows for new methods to be developed and used. READ MORE