Showing 1 - 2 results of 2 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Mubarak, Mohd Faizal
    Published 2015
    ... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...
    Get full text
    Thesis
  2. 2
    by Mubarak, Mohd Faizal
    Published 2010
    ... that unprotected RFID platform can be compromised either by malicious codes or man in the middle attack. System...
    Get full text
    Thesis