{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:01:53Z","timestamp":1766484113105,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433182","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["N-Guard: a Solution to Secure Access to NFC tags"],"prefix":"10.1109","author":[{"given":"Roberto Di","family":"Pietro","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Salleras","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Signorini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"184","author":"rieback","year":"2005","journal-title":"RFID Guardian A Battery-Powered Mobile Device for RFID Privacy Management"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"ref13","first-page":"1","article-title":"How to build a low-cost, extendedrange rfid skimmer","author":"kirschenbaum","year":"2006","journal-title":"Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 ser USENIX-SS&#x2019;06"},{"key":"ref14","first-page":"1","article-title":"Antenna circuit design for RFID application","author":"lee","year":"2003","journal-title":"Microchip Technology Application Note AN710 DS00710C"},{"key":"ref15","first-page":"149","article-title":"Secnfc: Securing inductively-coupled near field communication at physical layer","author":"jin","year":"2015","journal-title":"Communications and Network Security (CNS) 2015 IEEE Conference on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2434811"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CITSM.2016.7577582"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2640739"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464455"},{"key":"ref4","first-page":"35","article-title":"Practical nfc peer-to-peer relay attack using mobile phones","author":"lishoy","year":"2010","journal-title":"Proceedings of the 6th International Conference on Radio Frequency Identification Security and Privacy Issues ser RFIDSec&#x2019;10"},{"key":"ref3","first-page":"46","author":"anderson","year":"2007","journal-title":"Position statement in RFID s&p panel RFID and the middleman"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.33"},{"key":"ref5","first-page":"2","article-title":"Vulnerabilities in first-generation rfid-enabled credit cards","author":"heydt-benjamin","year":"2007","journal-title":"Financial Cryptography and Data Security 11th International Conference FC 2007"},{"key":"ref8","first-page":"1","article-title":"Cloning credit cards: A combined pre-play and downgrade attack on emv contactless","author":"roland","year":"2013","journal-title":"Presented as part of the 7th USENIX Workshop on Offensive Technologies"},{"key":"ref7","first-page":"21","article-title":"Chip and skim: cloning emv cards with the pre-play attack","volume":"abs 1209 2531","author":"bond","year":"2012","journal-title":"CoRR"},{"journal-title":"PayPass - M\/Chip requirements","first-page":"1","year":"2014","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1948.226245"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0407"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594376"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2492553"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.75"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2018,5,30]]},"location":"Beijing","end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433182.pdf?arnumber=8433182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:48:56Z","timestamp":1643212136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433182","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}