{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:33:47Z","timestamp":1775230427441,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319550701","type":"print"},{"value":"9783319550718","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,6,4]],"date-time":"2017-06-04T00:00:00Z","timestamp":1496534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-55071-8_27","type":"book-chapter","created":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T02:55:38Z","timestamp":1496458538000},"page":"208-214","source":"Crossref","is-referenced-by-count":4,"title":["RFID Eavesdropping Using SDR Platforms"],"prefix":"10.1007","author":[{"given":"F.","family":"Le Roy","sequence":"first","affiliation":[]},{"given":"T.","family":"Quiniou","sequence":"additional","affiliation":[]},{"given":"A.","family":"Mansour","sequence":"additional","affiliation":[]},{"given":"R.","family":"Lababidi","sequence":"additional","affiliation":[]},{"given":"D.","family":"Le Jeune","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,4]]},"reference":[{"key":"27_CR1","unstructured":"ISO\/IEC 14443-2: Identification cards Contactless integrated circuit(s) cards Proximity cards Part 2: Radio frequency power and signal interface (2001)"},{"key":"27_CR2","unstructured":"Oren, Y., Schirman, D., Wool, A.: RFID jamming and attacks on Israeli e-voting. In: Smart Objects, Systems and Technologies, pp. 1\u20137. VDE, Munich (2012)"},{"key":"27_CR3","unstructured":"Thevenon, P.H.: S\u00e9curisation de la couche physique des communications sans contact de type RFID et NFC. Phd thesis, Universit\u00e9 de Grenoble (2011)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Di J., Thompson D.R.: Security for RFID tags. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust. Springer, New York (2012)","DOI":"10.1007\/978-1-4419-8080-9_12"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Khoo, B., Harris, P., Husain, S.A.: Security risk analysis of RFID technology: a RFID tag life cycle approach. In: Wireless Telecommunications Symposium, pp. 1\u20137, Prague (2009)","DOI":"10.1109\/WTS.2009.5068991"},{"key":"27_CR6","unstructured":"Lee, E.: NFC hacking: the easy way. In: 20th DEFCON, Las Vegas (2012). \nhttp:\/\/www.defcon.org\/html\/links\/dc-archives\/dc-20-archive.html"},{"key":"27_CR7","unstructured":"Almeida, M.: Hacking Mifare Classic Cards. In: blackhat, Sao Paulo (2014). \nhttp:\/\/www.blackhat.com\/sp-14\/summit.html"},{"key":"27_CR8","unstructured":"Hancke, G.: Eavesdropping attacks on high-frequency RFID tokens. In: 4th Workshop on RFID Security (RFIDSec), pp. 100\u2013113 (2008)"},{"issue":"9","key":"27_CR9","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1109\/TC.2007.1050","volume":"56","author":"Y Oren","year":"2007","unstructured":"Oren, Y., Shamir, A.: Remote password extraction from RFID tags. IEEE Trans. Comput. 56(9), 1292\u20131296 (2007)","journal-title":"IEEE Trans. Comput."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: Conference on Security and Privacy for Emerging Areas in communications and Networks, pp. 74\u201388, Athens (2005)","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"27_CR11","unstructured":"Winkler, M., Faseth, T., Arthaber, H., Magerl, G.: An UHF RFID tag emulator for precise emulation of the physical layer. In: EuWIT, pp. 273\u2013276, Paris (2010)"},{"key":"27_CR12","unstructured":"http:\/\/www.nxp.com\/products\/identification-and-security\/nfc-and-reader-ics"},{"key":"27_CR13","unstructured":"http:\/\/www.gnuradio.org\/redmine\/projects\/gnuradio\/wiki"},{"key":"27_CR14","unstructured":"http:\/\/www.sourceforge.net\/p\/openlte\/wiki\/Home\/"},{"key":"27_CR15","unstructured":"Humphreys, T.E., Ledvina, B., Psiaki, M., OHanlon, B., Kintner J. Paul M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: ION GNSS 200, pp 2314-2325, Savannah (2008)"},{"key":"27_CR16","unstructured":"Huang, L., Yang, Q.: GPS SPOOFING Low-cost GPS simulator. In: 23th DEFCON, Las Vegas (2015)"},{"key":"27_CR17","unstructured":"Balduzzi, M.: AIS exposed understanding vulnerabilities and attacks 2.0. In: Blackhat Asia, Singapore, (2014). \nhttp:\/\/www.blackhat.com\/asia-14\/archives.html"},{"key":"27_CR18","unstructured":"http:\/\/www.rtl-sdr.com\/adsb-aircraft-radar-with-rtl-sdr"},{"key":"27_CR19","unstructured":"Feigin, J.: signal processing-practical costas loop design-designing a simple and inexpensive BPSK costas loop carrier recovery circuit. In: RF 25(1), (2002)"}],"container-title":["Lecture Notes in Electrical Engineering","Applications in Electronics Pervading Industry, Environment and Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55071-8_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T03:02:30Z","timestamp":1496458950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55071-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,4]]},"ISBN":["9783319550701","9783319550718"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55071-8_27","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,4]]}}}