Security Implications of NFC in Authentication and Identity Management

  • Wednesday, October 30, 2013 | 15.30 – 16.20 hrs | Room: G105

View all Sessions

Two-factor authentication (2FA) requirements are well defined. But the standard approach requiring distribution of factors can slow adoption. Explore the security implications of using existing NFC devices with credentials that customers already have, to meet 2FA requirements. Learn about open standard authentication protocols between NFC devices, Credential Service Providers and Relying Parties.


This document was retrieved from on Fri, 24 May 2019 17:17:39 -0400.