Extrait
Table of Contents
Abstract
Chapter 1 Introduction
Chapter 2
Background
2.1 Near Field Communication
2.1.1 Tag Reader/Writer Mode
2.1.2 Peer to Peer Mode
2.1.3 Card Emulation Mode
2.2 NFC tags
2.2.1 Tag types
2.3 NFC Data Exchange Format (NDEF)
2.4 Reading NDEF data from an NFC tag
2.5 Cryptography
2.5.1 Symmetric Key Cryptography
2.5.2 Public Key Cryptography
2.6 Artificial Neural Network (ANN)
2.7 Category Classifier
Chapter 3
NFC Security Threats
3.1 Exposure to Adult/Objectionable content
3.2 Phishing
3.3 Automated malware download and malicious web pages
3.4 Eavesdropping
3.5 Data Corruption
3.6 Data Modification
Chapter 4
Counter-Measures
4.1 Exposure to Adult/Objectionable content
4.2 Phishing
4.3 Automated malware downloads and malicious websites
Chapter 5
Proposed Security Model
5.1 Components
5.2 User Sign-Up
5.3 Working
5.3.1 Personalised Security List
5.3.2 Data Uploading
5.3.3 Data Retrieval
5.4 Anonymity
Chapter 6
Conclusion and Future Work
6.1 Conclusion
6.2 Future work
Bibliography
- Citation du texte
- Siddharth Sharma (Auteur), 2015, Secure data transmission between an NFC tag and an NFC enabled smartphone, Munich, GRIN Verlag, https://www.grin.com/document/337906
Devenir un auteur
Commentaires