Skip to main content
. 2016 Dec 24;17(1):28. doi: 10.3390/s17010028

Figure 20.

Figure 20

Nested attack for an university RFID card.