期刊文献+

射频卡安全设计策略

Strategy of RF Card Secure Design
下载PDF
导出
摘要 射频识别技术在我国各行业的应用已越来越广泛,甚至用于一些十分重要的领域,因此射频卡的安全性问题已越来越重要。本文通过分析黑客攻击射频卡芯片的常用方法:版图重构、存储器读出、电流分析、故障攻击、测试态攻击,提出了射频卡设计时防护这些攻击的策略。 RFID has more and more wide range of application in all walks of industries in China, even it was applied in some important field. So safety problem of RF Card is more and more important, This paper analyzed the methods of Hacker attack the RF card, these are circuit diagram rebuild, memories readout, amperometry, failure attack, and testing condition attack. It brings forward some methods to defend on the attack of Hacker to the RF card.
作者 田拥军
出处 《电子质量》 2007年第2期18-20,共3页 Electronics Quality
关键词 射频卡 破坏性攻击 非破坏性攻击 安全设计 RF Card Subversive attack Nondestructive attack Secure Design
  • 相关文献

参考文献1

二级参考文献11

  • 1程源,高建.企业外部技术获取:机理与案例分析[J].科学学与科学技术管理,2005,26(1):43-47. 被引量:18
  • 2崔雪松,王玲.企业技术获取的方式及选择依据[J].科学学与科学技术管理,2005,26(5):141-144. 被引量:30
  • 3[3]TROTT P,CORDEY-HAYES M.Developing a ' receptive'R&D environment forward technology transfer:a case study of the chemical industry[J].R&D Management,1996,26(1):83-92.
  • 4[4]LEE J,BAE Z T,CHOI D K.Technology development process:a model for a developing country with a global perspective[J].Rand D Management,1988,18(3):235-250.
  • 5[5]SHARIF M N,ISLAN M N.The weibull distribution as a general model for forecasting technological change[J].Techno Forecast Social Change,1980,(18):247-256.
  • 6[7]COHEN W M,LEVINTHAL D A.Absorptive capacity:A new perspective on learning and innovation[J].Administrative Science Quarterly,1990,35:128-152.
  • 7[8]GERSCHENKRON,A.Economic Backwardness in Historical Perspective[M].Cambridge:Harvard University Press,1962.
  • 8[9]MANSFIELD E,SCHWARTZ M,WANGNER S.Imitation costs and patents:an empirical study[J].Economic Journal,1981,91(364):907-918.
  • 9[12]戴维·J·科利斯.公司战略[M].北京:中国人民大学出版社,哈佛商学院出版社,2001.
  • 10李贻宾.日本企业研究与开发管理的演变[J].现代日本经济,2001(5):41-45. 被引量:11

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部