Introduction.- Basics.- Exemplary Use-Cases.- Related Work.- Tagging.- Card Emulation.- Software-based Relay Attacks on Existing Applications.- Summary and Outlook.
Read More
Introduction.- Basics.- Exemplary Use-Cases.- Related Work.- Tagging.- Card Emulation.- Software-based Relay Attacks on Existing Applications.- Summary and Outlook.
Read Less