Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
RFID security and privacy: A research survey
A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
On physical-layer identification of wireless devices
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …
The security of autonomous driving: Threats, defenses, and future directions
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …
by releasing the burden of drivers and reducing traffic accidents with more precise control …
Comprehensive experimental analyses of automotive attack surfaces
Modern automobiles are pervasively computerized, and hence potentially vulnerable to
attack. However, while previous research has shown that the internal networks within some …
attack. However, while previous research has shown that the internal networks within some …
Experimental security analysis of a modern automobile
Modern automobiles are no longer mere mechanical devices; they are pervasively
monitored and controlled by dozens of digital computers coordinated via internal vehicular …
monitored and controlled by dozens of digital computers coordinated via internal vehicular …
[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …
The internet of things: A survey from the data-centric perspective
Advances in sensor data collection technology, such as pervasive and embedded devices,
and RFID Technology have lead to a large number of smart devices which are connected to …
and RFID Technology have lead to a large number of smart devices which are connected to …
Attacks and defenses in short-range wireless technologies for IoT
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions
Internet of Vehicles (IoV) is a multinode network that exchanges information in an open,
wireless environment. Various communication activities exist between IoV entities to share …
wireless environment. Various communication activities exist between IoV entities to share …
Lock it and still lose it—on the ({In) Security} of automotive remote keyless entry systems
While most automotive immobilizer systems have been shown to be insecure in the last few
years, the security of remote keyless entry systems (to lock and unlock a car) based on …
years, the security of remote keyless entry systems (to lock and unlock a car) based on …