CEN/TR 16670:2014
Current
Current
The latest, up-to-date edition.
Information technology - RFID threat and vulnerability analysis
Published date
06-04-2014
Publisher
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviations
4 Threats and Attack scenarios
5 Vulnerabilities
6 Mitigation measures
7 Conclusions
Annex A (informative) - Attack scenarios
Annex B - Original Test Set ups and Results
Annex C - Additional Test Set ups and Results
Bibliography
Sorry this product is not available in your region.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.