{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:45:59Z","timestamp":1771951559106,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/rfid-ta.2011.6068658","type":"proceedings-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T22:03:03Z","timestamp":1320444183000},"page":"335-342","source":"Crossref","is-referenced-by-count":27,"title":["Weaknesses of the ISO\/IEC 14443 protocol regarding relay attacks"],"prefix":"10.1109","author":[{"given":"Wolfgang","family":"Issovits","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hutter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2010","journal-title":"Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 1 Physical Characteristics"},{"key":"ref11","year":"2010","journal-title":"Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards - Part 2 Radio Frequency Power and Signal Interface"},{"key":"ref12","year":"2010","journal-title":"Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 3 Initialization and Anticollision"},{"key":"ref13","year":"2010","journal-title":"Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 4 Transmission Protocol"},{"key":"ref14","article-title":"Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems","author":"kfir","year":"2005","journal-title":"International Conference on Security and Privacy for Emerging Areas in Communications Networks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.769"},{"key":"ref16","article-title":"Vendor Group Seeks to Crack Mi-fare Dominance","year":"2010","journal-title":"NFC Times"},{"key":"ref17","year":"2011","journal-title":"Nokia Nokia 6212 classic"},{"key":"ref18","year":"2011","journal-title":"NXP Semiconductors MIFARE"},{"key":"ref19","year":"2005","journal-title":"Rayson BTM-222 datasheet"},{"key":"ref4","article-title":"Keep your enemies close: distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"ref3","author":"conway","year":"1976","journal-title":"On Numbers and Games"},{"key":"ref6","article-title":"Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones","author":"francis","year":"2010","journal-title":"6th International Workshop RFIDSec"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470665121"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"ref7","author":"hancke","year":"2005","journal-title":"A Practical Relay Attack on ISO 14443 Proximity Cards"},{"key":"ref2","year":"2011"},{"key":"ref1","year":"2011","journal-title":"Atmel ATxmega 256A3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.001"},{"key":"ref20","year":"2011","journal-title":"Rayson"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73275-4_8","article-title":"Distance Bounding in Noisy Environments","author":"singel\u00e9e","year":"2007","journal-title":"Proceeding ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/1229285.1229314","article-title":"Detecting Relay Attacks with Timing-Based Protocol","author":"reid","year":"2007","journal-title":"Proceeding ASIACCS'07 Proceedings of the 2nd ACM symposium on Information computer and communications security"},{"key":"ref23","article-title":"Performing Relay Attacks on ISO 14443 Contactless Smart Cards using NFC Mobile Equipment","author":"weiss","year":"2010","journal-title":"Master's thesis"}],"event":{"name":"2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","location":"Sitges, Spain","start":{"date-parts":[[2011,9,15]]},"end":{"date-parts":[[2011,9,16]]}},"container-title":["2011 IEEE International Conference on RFID-Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6058515\/6068591\/06068658.pdf?arnumber=6068658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:11:31Z","timestamp":1497949891000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6068658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2011.6068658","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}