Presentation Information

[D-19-11]Demonstrating Improper Authentication by Emulating Unencrypted FeliCa Communication

○Keiichi Morita1, Hirofumi Yamaki1 (1. Tokyo Denki University)
PDF DownloadDownload PDF

Keywords:

FeliCa,Authentication,Vulnerability Verification,Near Field Communication