메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 1139-1144

Towards secure IFF: Preventing mafia fraud attacks

Author keywords

Identification; IFF; Mafia fraud

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FREQUENCY HOPPING; NETWORK PROTOCOLS; SECURITY OF DATA; THEOREM PROVING;

EID: 0037004569     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 3
    • 85030309636 scopus 로고
    • Identification tokens-or: Solving the chess grandmaster problem
    • in Advances in Cryptology - CRYPTO '90, A.J. Menezes and S.A. Vanstone, Eds. International Association for Cryptologic Research; Springer-Verlag, Berlin Germany
    • Thomas Beth and Yvo Desmedt, "Identification tokens - or: Solving the chess grandmaster problem," in Advances in Cryptology - CRYPTO '90, A.J. Menezes and S.A. Vanstone, Eds. International Association for Cryptologic Research, 1991, vol. 537 of Lecture Notes in Computer Science, pp. 169-176, Springer-Verlag, Berlin Germany.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 169-176
    • Thomas, B.1    Yvo, D.2
  • 4
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • Uriel Feige, Amos Fiat, and Adi Shamir, "Zero-knowledge proofs of identity," Journal of Cryptology, vol. 1, no. 2, pp. 77-94, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 6
    • 84945138489 scopus 로고    scopus 로고
    • Identification protocols secure against reset attacks
    • in Advances in Cryptology - EUROCRYPT '2001, Birgit Pfitzmann, Ed., Innsbruck, Austria; Springer-Verlag, Berlin Germany
    • Mihir Bellare, Marc Fischlin, Shafi Goldwasser, and Silvio Micali, "Identification protocols secure against reset attacks," in Advances in Cryptology - EUROCRYPT '2001, Birgit Pfitzmann, Ed., Innsbruck, Austria, 2001, vol. 2045 of Lecture Notes in Computer Science, pp. 493-508, Springer-Verlag, Berlin Germany.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 493-508
    • Bellare, M.1    Fischlin, M.2    Goldwasser, S.3    Micali, S.4
  • 7
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Claus P. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 8
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
    • SEDEP Paris, France
    • Yvo Desmedt, "Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them," in SecuriCom '88, SEDEP Paris, France, 1988.
    • (1988) SecuriCom '88
    • Desmedt, Y.1
  • 9
    • 0013393580 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • Dorothy E. Denning and Peter J. Denning, Eds.; ACM Press / Addison-Wesley, New York; Reprint from Computer Fraud and Security, Elsevier Science, Ltd, February 1996
    • Dorothy E. Denning and Peter F. MacDoran, "Location-based authentication: Grounding cyberspace for better security," in Internet Besieged: Countering Cyberspace Scofflaws, Dorothy E. Denning and Peter J. Denning, Eds., pp. 167-174. ACM Press / Addison-Wesley, New York, 1998, Reprint from Computer Fraud and Security, Elsevier Science, Ltd, February 1996.
    • Internet Besieged: Countering Cyberspace Scofflaws , pp. 167-174
    • Denning, D.E.1    MacDoran, P.F.2
  • 11
    • 84976295016 scopus 로고    scopus 로고
    • Distance-bounding protocols
    • Advances in Cryptology - EUROCRYPT '93, T. Helleseth, Ed. International Association for Cryptologic Research, 1994; Springer-Verlag, Berlin Germany
    • Stefan Brands and David Chaum, "Distance-bounding protocols," in Advances in Cryptology - EUROCRYPT '93, T. Helleseth, Ed. International Association for Cryptologic Research, 1994, of Lecture Notes in Computer Science, pp. 344-359, Springer-Verlag, Berlin Germany.
    • Lecture Notes in Computer Science , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 12
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - CRYPTO '93, Douglas R. Stinson, Ed. International Association for Cryptologic Research; Springer-Verlag, Berlin, Germany
    • Mihir Bellare and Phillip Rogaway, "Entity authentication and key distribution," in Advances in Cryptology - CRYPTO '93, Douglas R. Stinson, Ed. International Association for Cryptologic Research, 1994, vol. 773 of Lecture Notes in Computer Science, pp. 232-249, Springer-Verlag, Berlin, Germany.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 15
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Victoria Ashby, Ed., Fairfax, Virginia, Nov.; ACM Press
    • Mihir Bellare and Phillip Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proceedings of the 1st ACM Conference on Computer and Communications Security, Victoria Ashby, Ed., Fairfax, Virginia, Nov. 1993, pp. 62-73, ACM Press.
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 17
    • 0013347999 scopus 로고    scopus 로고
    • The PERSEUS system architecture
    • Tech. Rep. RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, Apr.
    • Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, and Arnd Weber, "The PERSEUS system architecture," Tech. Rep. RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, Apr. 2001.
    • (2001)
    • Pfitzmann, B.1    Riordan, J.2    Stüble, C.3    Waidner, M.4    Weber, A.5
  • 18
    • 0033294823 scopus 로고    scopus 로고
    • Authenticating public terminals
    • May
    • N. Asokan, Hervé Debar, Michael Steiner, and Michael Waidner, "Authenticating public terminals," Computer Networks, vol. 31, no. 8, pp. 861-870, May 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 861-870
    • Asokan, N.1    Debar, H.2    Steiner, M.3    Waidner, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.