{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:36:16Z","timestamp":1743075376679,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402029"},{"type":"electronic","value":"9783642402036"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40203-6_36","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T02:48:53Z","timestamp":1376448533000},"page":"646-663","source":"Crossref","is-referenced-by-count":5,"title":["Range Extension Attacks on Contactless Smart Cards"],"prefix":"10.1007","author":[{"given":"Yossef","family":"Oren","sequence":"first","affiliation":[]},{"given":"Dvir","family":"Schirman","sequence":"additional","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"libnfc website (2013), \n                    \n                      http:\/\/nfc-tools.org\/index.php?title=Main_Page"},{"key":"36_CR2","unstructured":"APACS. APACS response to BBC watchdog and chip and PIN. Press realese (February 2007), \n                    \n                      http:\/\/www.chipandpin.co.uk\/media\/documents\/APACSresponsetoWatchdogandchipandPIN-06.02.07.pdf"},{"key":"36_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the Fiat-Shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 21\u201339. Springer, Heidelberg (1988)"},{"key":"36_CR4","unstructured":"Finkenzeller, K.: Battery powered tags for ISO\/IEC 14443, actively emulating load modulation. In: 7th European Workshop on Smart Objects: Systems, Technologies and Applications (RFID SysTech) (May 2011)"},{"key":"36_CR5","unstructured":"Finkenzeller, K., Pfeiffer, F., Biebl, E.: Range Extension of an ISO\/IEC 14443 type A RFID System with Actively Emulating Load Modulation. In: 7th European Workshop on Smart Objects: Systems, Technologies and Applications (RFID SysTech) (May 2011)"},{"key":"36_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-16822-2_4","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"L. Francis","year":"2010","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 35\u201349. Springer, Heidelberg (2010)"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Hancke, G.P.: Practical attacks on proximity identification systems (short paper). In: SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 328\u2013333. IEEE Computer Society (2006)","DOI":"10.1109\/SP.2006.30"},{"issue":"2","key":"36_CR8","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3233\/JCS-2010-0407","volume":"19","author":"G.P. Hancke","year":"2011","unstructured":"Hancke, G.P.: Practical eavesdropping and skimming attacks on high-frequency RFID tokens. Journal of Computer Security\u00a019(2), 259\u2013288 (2011)","journal-title":"Journal of Computer Security"},{"key":"36_CR9","unstructured":"Texas Instruments. Multi function reader series 4000 (March 2005), \n                    \n                      http:\/\/www.ti.com\/rfid\/docs\/manuals\/pdfSpecs\/RF-MFR-RNLK-00.pdf"},{"key":"36_CR10","unstructured":"International Organization for Standardization, Geneva. ISO\/IEC 14443-1 Identification cards \u2013 Contactless integrated circuit cards \u2013 Proximity cards \u2013 Part 1: Physical characteristics (2008)"},{"key":"36_CR11","unstructured":"International Organization for Standardization, Geneva. ISO\/IEC 14443-4 Identification cards \u2013 Contactless integrated circuit cards \u2013 Proximity cards \u2013 Part 4: Transmission protocol (2008)"},{"key":"36_CR12","unstructured":"International Organization for Standardization, Geneva. ISO\/IEC 14443-2 Identification cards \u2013 Contactless integrated circuit cards \u2013 Proximity cards \u2013 Part 2: Radio frequency power and signal interface (2010)"},{"key":"36_CR13","unstructured":"International Organization for Standardization, Geneva. ISO\/IEC 14443-3 Identification cards \u2013 Contactless integrated circuit cards \u2013 Proximity cards \u2013 Part 3: Initialization and anticollision (2011)"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Issovits, W., Hutter, M.: Weaknesses of the ISO\/IEC 14443 protocol regarding relay attacks. In: 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 335\u2013342. IEEE (2011)","DOI":"10.1109\/RFID-TA.2011.6068658"},{"key":"36_CR15","unstructured":"Kfir, Z., Wool, A.: Picking virtual pockets using relay attacks on contactless smartcards. In: International Conference on Security and Privacy for Emerging Areas in Communications Networks, Los Alamitos, CA, USA, pp. 47\u201358. IEEE Computer Society (2005)"},{"key":"36_CR16","unstructured":"Kirschenbaum, I., Wool, A.: How to build a low-cost, extended-range RFID skimmer. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C., Canada. USENIX Association (2006)"},{"key":"36_CR17","unstructured":"Bit Manufaktur. OpenPCD2 (2012), \n                    \n                      http:\/\/www.openpcd.org\/OpenPCD_2_RFID_Reader_for_13.56MHz"},{"key":"36_CR18","unstructured":"Mini-Circuits. ZFL-500LN low noise amplifier, \n                    \n                      http:\/\/www.minicircuits.com\/pdfs\/ZFL-500LN.pdf"},{"key":"36_CR19","unstructured":"Mini-Circuits. ZHL-32A coaxial amplifier (August 2009), \n                    \n                      http:\/\/www.minicircuits.com\/pdfs\/ZHL-32A.pdf"},{"key":"36_CR20","unstructured":"New-Tronics. mobile HF hustler antenna (October 2008), \n                    \n                      http:\/\/www.new-tronics.com\/main\/html\/mobile__hf.html"},{"key":"36_CR21","unstructured":"NXP. AN1425 - RF Amplifier for NXP Contactless NFC Reader ICs (August 2011), \n                    \n                      http:\/\/www.nxp.com\/download\/grouping\/10529\/application_note"},{"key":"36_CR22","unstructured":"NXP. PN532 - Near Field Communication (NFC) controller (September 2012), \n                    \n                      http:\/\/www.nxp.com\/documents\/short_data_sheet\/PN532_C1_SDS.pdf"},{"key":"36_CR23","unstructured":"Oren, Y., Schirman, D., Wool, A.: RFID jamming and attacks on Israeli e-voting. In: ITG-Fachbericht-Smart SysTech 2012 (2012)"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Oren, Y., Wool, A.: RFID-Based electronic voting: What could possibly go wrong? In: International IEEE Conference on RFID, Orlando, USA, pp. 118\u2013125 (2010)","DOI":"10.1109\/RFID.2010.5467269"},{"key":"36_CR25","unstructured":"Pfeiffer, F., Finkenzeller, K., Biebl, E.: Theoretical limits of ISO\/IEC 14443 type A RFID eavesdropping attacks. In: ITG-Fachbericht-Smart SysTech 2010 (2012)"},{"key":"36_CR26","unstructured":"RM-Italy. KL400 Linear Amplifier (2005), \n                    \n                      http:\/\/www.rmitaly.com\/scheda.asp?IDGr=1&cat=0&tipo=96"},{"key":"36_CR27","unstructured":"Runge, T.: Schriftliche arbeit jugend forscht: Der RFID-Zapper (February 2007) (in German), \n                    \n                      http:\/\/rfidzapper.dyndns.org\/RFID-ZAPPER.pdf"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Sportiello, L., Ciardulli, A.: Long distance relay attack. RFIDSec (July 2013)","DOI":"10.1007\/978-3-642-41332-2_5"},{"key":"36_CR29","unstructured":"Straw, R.D.: The ARRL antenna book: The Ultimate Reference for Amateur Radio Antennas. Amer Radio Relay League (2003)"},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Thevenon, P.-H., Savry, O., Tedjini, S., Malherbi-Martins, R.: Attacks on the HF physical layer of contactless and RFID systems. In: Current Trends and Challenges in RFID (2011)","DOI":"10.5772\/20422"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2013"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40203-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:02:38Z","timestamp":1559505758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40203-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402029","9783642402036"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40203-6_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}