Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
The rapid growth of Near Field Communication (NFC) technology has facilitated its widespread adoption in everyday activities, particularly in cashless mobile payments and access control among urban dwellers. However, this convenience is accompanied by significant security risks, including data spoof...
| Main Authors: | Megat Khalid, Puteri Shariza, Mohd Sani, Nor Fazlida |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Little Lion Scientific
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/118812/ http://psasir.upm.edu.my/id/eprint/118812/1/118812.pdf |
Similar Items
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017)
by: Cheong, Philip Zhi Qiang
Published: (2017)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Visualization mobile employee attendance system with near field communication (NFC) technology
by: Goh, Wen Sen
Published: (2014)
by: Goh, Wen Sen
Published: (2014)
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
A review of student attendance system using near-field communication (NFC) technology
by: Mohd Nasir, Mohd Ameer Hakim, et al.
Published: (2015)
by: Mohd Nasir, Mohd Ameer Hakim, et al.
Published: (2015)
The adoption intention of Near Field Communication (NFC) - enabled mobile payment among consumers in Malaysia
by: Dhaarshini, Balachandaran
Published: (2015)
by: Dhaarshini, Balachandaran
Published: (2015)
Integrating reading and writing to facilitate reading engagement through epistolary writing among ESL tertiary students / Puteri Rohani Megat Abdul Rahim
by: Megat Abdul Rahim, Puteri Rohani
Published: (2015)
by: Megat Abdul Rahim, Puteri Rohani
Published: (2015)
Integrating reading and writing to facilitate reading engagement through epistolary writing among ESL tertiary students / Puteri Rohani Megat Abdul Rahim
by: Megat Abdul Rahim, Puteri Rohani
Published: (2015)
by: Megat Abdul Rahim, Puteri Rohani
Published: (2015)
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)
by: Li, Siling
Published: (2012)
'Infrastructure funds given to NFC'
by: Habibu, Sira
Published: (2014)
by: Habibu, Sira
Published: (2014)
Electronic medical record with Near Field Communication (NFC) authentication and telegram bot reminder / Muhammad Aizat Kamarudin
by: Kamarudin, Muhammad Aizat
Published: (2018)
by: Kamarudin, Muhammad Aizat
Published: (2018)
Narrative dissidence, spoof videos and alternative memory in China
by: Li, Siling
Published: (2015)
by: Li, Siling
Published: (2015)
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
An adoption of Halal food recognition system using Mobile Radio Frequency Identification (RFID) and near field communication (NFC)
by: Khosravi, Mohsen, et al.
Published: (2016)
by: Khosravi, Mohsen, et al.
Published: (2016)
Moving Towards Cashless Society: Malaysian Consumers Intention To Adopt Near Field Communication (Nfc) - Enabled Mobile Payment
by: Balachandran, Dhaarshini
Published: (2022)
by: Balachandran, Dhaarshini
Published: (2022)
Biodegradability effects on the PHA/NFC nanocomposite
by: Adhwa Wirdany, Abdul Razak, et al.
Published: (2022)
by: Adhwa Wirdany, Abdul Razak, et al.
Published: (2022)
NFC-based data retrieval device
by: Abd Wahab, Mohd Helmy, et al.
Published: (2018)
by: Abd Wahab, Mohd Helmy, et al.
Published: (2018)
NFC-based data retrieval device
by: Abd Wahab, Mohd Helmy, et al.
Published: (2018)
by: Abd Wahab, Mohd Helmy, et al.
Published: (2018)
Factors Influencing Intention To
Adopt Near Field Communication (Nfc)
Proximity Payment Technology
Among Bank Customers In Lagos,
Nigeria
by: Idris, Gambo
Published: (2021)
by: Idris, Gambo
Published: (2021)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
Security of NFC payment on mobile payment application
by: Wong, Wen Teng
Published: (2018)
by: Wong, Wen Teng
Published: (2018)
Road safety may be compromised
by: Babulal, Veena
Published: (2019)
by: Babulal, Veena
Published: (2019)
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
Texture analysis using local ternary pattern for face anti-spoofing
by: Parveen, Sajida, et al.
Published: (2016)
by: Parveen, Sajida, et al.
Published: (2016)
Facilitating reading engagement by foregrounding students’ voices through epistolary writing: a case study
by: Puteri Rohani Megat Abdul Rahim,, et al.
Published: (2015)
by: Puteri Rohani Megat Abdul Rahim,, et al.
Published: (2015)
Halal products recognition using RFID/NFC technology
by: Khosravi, Mohsen, et al.
Published: (2017)
by: Khosravi, Mohsen, et al.
Published: (2017)
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
E-wallet using NFC mobile application development
by: Chong, Yao En
Published: (2023)
by: Chong, Yao En
Published: (2023)
Digital student ID card using NFC technology
by: Eng, Mun Shuen
Published: (2022)
by: Eng, Mun Shuen
Published: (2022)
Confusion, coercion and compromise in Malaysian federalism
by: Mokhtar, Khairil Azmin
Published: (2014)
by: Mokhtar, Khairil Azmin
Published: (2014)
Confusion, Coercion and Compromise in Malaysian Federalism
by: Mokhtar, Khairil Azmin
Published: (2013)
by: Mokhtar, Khairil Azmin
Published: (2013)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
NFC based attendance: More than just a touch
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2016)
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2016)
NFC based attendance: more than just a touch
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2015)
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2015)
Winners and losers from the government’s compromise on superannuation
by: Hodgson, Helen
Published: (2016)
by: Hodgson, Helen
Published: (2016)
A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver
by: Meng, Q., et al.
Published: (2019)
by: Meng, Q., et al.
Published: (2019)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Academic Reading & Writing : Paraphrasing
by: Chuah, Kee-Man
Published: (2014)
by: Chuah, Kee-Man
Published: (2014)
Reading to writing: effects of authentic readings
on novice Spanish students’ writing / Ana I. Capanegra
by: I. Capanegra, Ana
Published: (2014)
by: I. Capanegra, Ana
Published: (2014)
Database Integration via Mediator Approach for Integrated Applications with NFC Technology
by: Mohd Kamir, Yusof, et al.
Published: (2014)
by: Mohd Kamir, Yusof, et al.
Published: (2014)
Similar Items
-
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017) -
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017) -
Visualization mobile employee attendance system with near field communication (NFC) technology
by: Goh, Wen Sen
Published: (2014) -
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009) -
A review of student attendance system using near-field communication (NFC) technology
by: Mohd Nasir, Mohd Ameer Hakim, et al.
Published: (2015)