NFC ile Güvenli Uygulamalar için Donanim / Yazilim Ortak Sistem Tasarimi ve Gerçeklenmesi

Translated title of the contribution: Hardware / software codesign and implementation for secure NFC applications

Subutay Giray Baskir, Berna Ors

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In this project a system design and implementation has made for allowing usage of Near Field Communication (NFC) enabled devices securely. In order to make the design appropriate to NFC standards, primarily an implementation environment infrastructure has been built. Additionally, the method of hardware & software codesign is operated. At the stage of implementing hardware side; FPGA is used for implementing necessary cryptographic algorithms. At the stage of implementing software side; the order of the protocol flow and two-way communication is implemented for secured NFC protocol by controlling cryptographic algorithms which are implemented at the hardware side.

Translated title of the contributionHardware / software codesign and implementation for secure NFC applications
Original languageTurkish
Title of host publication2015 23rd Signal Processing and Communications Applications Conference, SIU 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2392-2395
Number of pages4
ISBN (Electronic)9781467373869
DOIs
Publication statusPublished - 19 Jun 2015
Event2015 23rd Signal Processing and Communications Applications Conference, SIU 2015 - Malatya, Turkey
Duration: 16 May 201519 May 2015

Publication series

Name2015 23rd Signal Processing and Communications Applications Conference, SIU 2015 - Proceedings

Conference

Conference2015 23rd Signal Processing and Communications Applications Conference, SIU 2015
Country/TerritoryTurkey
CityMalatya
Period16/05/1519/05/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Fingerprint

Dive into the research topics of 'Hardware / software codesign and implementation for secure NFC applications'. Together they form a unique fingerprint.

Cite this