[1]
K. Nohl, H. Plötz, Mifare: Little security, despite obscurity, in: 24th Chaos Communication Congress, (2007).
Google Scholar
[2]
R. Ryan, Z. Anderson, A. Chiesa, Anatomy of a subway hack, 2008, http: /tech. mit. edu/ V128/N30/subway/Defcon_Presentation. pdf.
Google Scholar
[3]
G. de Koning Gans, J.H. Hoepman, F.D. Garcia, A practical attack on the MIFARE Classic, in: Proc. CARDIS, LNCS 5189, Springer-Verlag, 2008, pp.267-282.
DOI: 10.1007/978-3-540-85893-5_20
Google Scholar
[4]
K. Nohl, D. Evans, S. Starbug, H. Plötz, Reverse-engineering a cryptographic RFID tag, in: Proc. 17th Conf. USENIX Security Symp., 2008, pp.185-193.
Google Scholar
[5]
F.D. Garcia, G. de Koning Gans, R. Muijrers, P. van Rossum, R. Verdult, R.W. Schreur, B. Jacobs, Dismantling MIFARE Classic, in: Proc. 13th European Symp. Research in Computer Security, LNCS 5283, Springer-Verlag, 2008, pp.97-114.
DOI: 10.1007/978-3-540-88313-5_7
Google Scholar
[6]
Wikipedia, Crypto-1, http: /en. wikipedia. org/wiki/Crypto-1 (visited at April 15, 2012).
Google Scholar
[7]
J.H. Chiu, K.T. Huang, Mifare Classic authentication protocol security mechanism improvement solution, in: Proc. Cryptology and Information Security Conference, 2010 (in Chinese).
Google Scholar
[8]
M.Y. Chih, Practical Attacks and Defenses of MIFARE Classic, Master thesis, National Taiwan University, (2010).
Google Scholar
[9]
Philips Co., MIFARE Standard Card IC: MF1 IC S50 Functional Specification, http: /www. semiconductors. philips. com (visited at April 15, 2012).
Google Scholar
[10]
Y.C. Chiu, RFID Practice: Contactless Smart Card System Development, Xbook Marketing Co., Taipei, 2005 (in Chinese).
Google Scholar
[11]
Y.C. Mo, Young engineer hacked into EasyCard, police say, Taipei Times (September 28, 2011), http: /www. taipeitimes. com/News/taiwan/archives/2011/09/28/2003514388 (visited at April 15, 2012).
Google Scholar