Essays about: "security of NFC"

Showing result 1 - 5 of 17 essays containing the words security of NFC.

  1. 1. Multiplexing NFC Antennas : An evaluation of the technique and its limitations

    University essay from Jönköping University/JTH, Avdelningen för datavetenskap

    Author : Viktor Gustafsson; Per Ottosson; [2023]
    Keywords : AAT; BER; DSR; Impedance; Multiplexer; NFC; Wireless Technology;

    Abstract : Introduction This study aims to investigate the possibility of driving multiple NFC antennas with a single NFC-controller by using a multiplexer. An artifact was developed and experiments were conducted in order to evaluate the design choice and in addition, to observe the impact of a multiplexer in an NFC system with respect to the number of successful tag detections, bit error rate (BER), the utilization of automatic antenna tuning (AAT) and the physical distance to the NFC tag. READ MORE

  2. 2. Integrity and Security Considerations of Transparency and Traceability : an Exploratory Case Study of Traceability Validation Systems

    University essay from Högskolan i Borås/Akademin för textil, teknik och ekonomi

    Author : Caroline Löwenhav; Hanna Tingsvik; [2022]
    Keywords : Transparency; Traceability; Social Perspective; Integrity; Security; Traceability Validation System; Exploratory Research;

    Abstract : Background: In recent years, unfair and unsafe working conditions have been reported, raising concerns among stakeholders and end-users. The demand for fashion brands to take further responsibility for social sustainability and transparency has increased. READ MORE

  3. 3. Facial Match : A step towards winning the battle against the fraudsters

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Emad Aldeen Issawi; Osama Hajjouz; [2022]
    Keywords : Face recognition;

    Abstract : Identity fraud is a severe and ruthless crime, regardless of leasing a car insomeone else’s name or illegitimately getting a loan from a bank. The protection depends strongly on technical development to further increase the safetyof ID checking.This project aims to design an extra security ID checking on top of humanobservation. READ MORE

  4. 4. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Sebastian Leclerc; Philip Kärrström; [2022]
    Keywords : RFID; NFC; CLONING ATTACK; ACCESS CONTROL SYSTEM; MIFARE;

    Abstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE

  5. 5. Representing uncertainty analyses : Proposing guidelines for the design and presentation of representations of uncertainty analyses for position estimations in crime scene visualizations

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Katarina Iversen; [2022]
    Keywords : uncertainty representation; heat map; crime scene visualization; guidelines; position estimation;

    Abstract : At the Swedish National Forensic Centre [Nationellt Forensiskt Centrum] (NFC) 3D-models are being used to document crime scenes, and visualizations based on 3D-models are being used in court. In addition to this, 3D-models of crime scenes allows for new methods to be developed and used. READ MORE