Study on NFC Security Analysis and UICC Alternative Effect
Vol. 36, No. 1, pp. 29-36, Jan. 2011
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
S. Lim, J. Jeon, J. Imjin, O. Yi, "Study on NFC Security Analysis and UICC Alternative Effect," The Journal of Korean Institute of Communications and Information Sciences, vol. 36, no. 1, pp. 29-36, 2011. DOI: .
[ACM Style]
Sun-Hee Lim, Jae-woo Jeon, Jung Imjin, and Okyeon Yi. 2011. Study on NFC Security Analysis and UICC Alternative Effect. The Journal of Korean Institute of Communications and Information Sciences, 36, 1, (2011), 29-36. DOI: .
[KICS Style]
Sun-Hee Lim, Jae-woo Jeon, Jung Imjin, Okyeon Yi, "Study on NFC Security Analysis and UICC Alternative Effect," The Journal of Korean Institute of Communications and Information Sciences, vol. 36, no. 1, pp. 29-36, 1. 2011.