Skip to search formSkip to main contentSkip to account menu

Cover-coding

Cover-coding is a technique for obscuring the data that is transmitted over an insecure link, to reduce the risks of snooping. An example of cover… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The widespread distribution of RFID technologies may generate new threats to user privacy and security. The International… 
2013
2013
The authentication process of RFID tag's the tag/reader/server communicates over an insecure channel due to weak authentication… 
2012
2012
Researchers have shown that the Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification has serious security…