{"id":2886,"date":"2012-06-14T09:11:51","date_gmt":"2012-06-14T07:11:51","guid":{"rendered":"https:\/\/perisens.de\/?post_type=publication&#038;p=2886"},"modified":"2024-09-13T11:36:51","modified_gmt":"2024-09-13T09:36:51","slug":"theoretical-limits-of-iso-iec-14443-type-a-rfid-eavesdropping-attacks","status":"publish","type":"publication","link":"https:\/\/perisens.de\/en\/publication\/theoretical-limits-of-iso-iec-14443-type-a-rfid-eavesdropping-attacks\/","title":{"rendered":"Theoretical Limits of ISO\/IEC 14443 type A RFID Eavesdropping Attacks"},"content":{"rendered":"<p><strong>June 2012<\/strong>, Smart SysTech 2012 &#8211; European Conference on Smart Objects, Systems and Technologies, (M\u00fcnchen)<br \/>\nF. Pfeiffer (perisens), K. Finkenzeller (Giesecke &amp; Devrient) and E.M. Biebl (TU M\u00fcnchen)<br \/>\n<a href=\"\/wp-content\/uploads\/2018\/09\/publication2012_SmartSystech.pdf\" target=\"_blank\" rel=\"noopener\">Download (PDF)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>June 2012, Smart SysTech 2012 &#8211; European Conference on Smart Objects, Systems and Technologies, (M\u00fcnchen) F. Pfeiffer (perisens), K. Finkenzeller (Giesecke &amp; Devrient) and E.M. Biebl (TU M\u00fcnchen) Download (PDF)<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-2886","publication","type-publication","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/perisens.de\/en\/wp-json\/wp\/v2\/publication\/2886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perisens.de\/en\/wp-json\/wp\/v2\/publication"}],"about":[{"href":"https:\/\/perisens.de\/en\/wp-json\/wp\/v2\/types\/publication"}],"wp:attachment":[{"href":"https:\/\/perisens.de\/en\/wp-json\/wp\/v2\/media?parent=2886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}