PD CEN/TR 16670:2014
Current
The latest, up-to-date edition.
Information technology. RFID threat and vulnerability analysis
Hardcopy , PDF
English
06-30-2014
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviations
4 Threats and Attack scenarios
5 Vulnerabilities
6 Mitigation measures
7 Conclusions
Annex A (informative) - Attack scenarios
Annex B - Original Test Set ups and Results
Annex C - Additional Test Set ups and Results
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.