소리를 이용한 릴레이 공격 공격의 탐지
Vol. 23, No. 4, pp. 617-628,
8월.
2013
10.13089/JKIISC.2013.23.4.617,
Full Text:
Keywords: authentication, Man-in-the-middle Attack, Relay Attack, NFC, Audio Fingerprinting
Abstract Statistics
Cite this article


Keywords: authentication, Man-in-the-middle Attack, Relay Attack, NFC, Audio Fingerprinting
Abstract Statistics
Cite this article
[IEEE Style]
J. Kim, S. Kang, M. Hong, "Detecting a Relay Attack with a Background Noise," Journal of The Korea Institute of Information Security and Cryptology, vol. 23, no. 4, pp. 617-628, 2013. DOI: 10.13089/JKIISC.2013.23.4.617.
[ACM Style]
Jonguk Kim, Sukin Kang, and Manpyo Hong. 2013. Detecting a Relay Attack with a Background Noise. Journal of The Korea Institute of Information Security and Cryptology, 23, 4, (2013), 617-628. DOI: 10.13089/JKIISC.2013.23.4.617.