메뉴 건너뛰기




Volumn 6, Issue 11, 2007, Pages 4071-4078

Distance-bounding based defense against relay attacks in wireless networks

Author keywords

Discrete logarithm problem; Distance bounding; Elliptic curve cryptography; Non interactive zeroknowledge proof; Statistical outlier test; Timed oblivious transfer

Indexed keywords

DISCRETE LOGARITHM PROBLEM; ELLIPTIC CURVE CRYPTOGRAPHY; TIMED OBLIVIOUS TRANSFER;

EID: 36249008630     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2007.060183     Document Type: Article
Times cited : (4)

References (31)
  • 2
    • 36248986459 scopus 로고    scopus 로고
    • M. Rabin, How to exchange secrets by oblivious transfer, Aiken's Computation. Laboratory, Harvard University, Massachusetts, U.S.A., Tech. Rep. Tech. Memo TR-81, 1981.
    • M. Rabin, "How to exchange secrets by oblivious transfer," Aiken's Computation. Laboratory, Harvard University, Massachusetts, U.S.A., Tech. Rep. Tech. Memo TR-81, 1981.
  • 5
    • 0024135240 scopus 로고
    • Zero knowledge proofs of identity
    • U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," J. of Cryptology, vol. I, no. 2, pp. 77-94, 1988.
    • (1988) J. of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 7
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Lecture Notes on Computer Science () Springer-Verlag
    • S. Brands and D. Chaum, "Distance-bounding protocols," in Lecture Notes on Computer Science (LNCS) Volume 765. Springer-Verlag, .1993, pp. 344-359.
    • (1993) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 10
    • 0005599967 scopus 로고
    • Analysis and comparison of some integer factoring algorithms
    • J. H. W. Lenstra and R. Tijdeman, Eds. Amsterdam, The Netherlands: Mathematisch Centrum
    • C. Pomerance, "Analysis and comparison of some integer factoring algorithms," in Computational Methods in Number Theory, J. H. W. Lenstra and R. Tijdeman, Eds. Amsterdam, The Netherlands: Mathematisch Centrum, 1982, pp. 89-139.
    • (1982) Computational Methods in Number Theory , pp. 89-139
    • Pomerance, C.1
  • 11
    • 84957014368 scopus 로고
    • Discrete logarithm, in finite fields and their cryptographic significance
    • Springer-Verlag
    • A. M. Odlyzko, "Discrete logarithm, in finite fields and their cryptographic significance," in Proc Euwcrypt. Springer-Verlag, 1985, pp. 224-314.
    • (1985) Proc Euwcrypt , pp. 224-314
    • Odlyzko, A.M.1
  • 12
    • 0141980202 scopus 로고    scopus 로고
    • Square-root algorithms for the discrete logarithm problem
    • Walter de Gruyter
    • E. Teske, "Square-root algorithms for the discrete logarithm problem," in Public Key Cryptogmphy and Computational Number Theory. Walter de Gruyter, 2001, pp. 283-301.
    • (2001) Public Key Cryptogmphy and Computational Number Theory , pp. 283-301
    • Teske, E.1
  • 14
    • 0018997051 scopus 로고
    • Introduction to spread-spectrum antimultipath techniques and their application to urban digital radio
    • Mar
    • G. L. Turin, "Introduction to spread-spectrum antimultipath techniques and their application to urban digital radio," Proc. IEEE, vol. 68, no. 3, pp. 328-353, Mar. 1980.
    • (1980) Proc. IEEE , vol.68 , Issue.3 , pp. 328-353
    • Turin, G.L.1
  • 16
    • 0028516581 scopus 로고
    • Estimation of frequency-delay of arrival (FDOA) using fourth-order statistics in unknown correlated gaussian noise sources
    • Oct
    • D. C. Shin and C. L. Nikias, "Estimation of frequency-delay of arrival (FDOA) using fourth-order statistics in unknown correlated gaussian noise sources," IEEE Trans. Signal Processing, vol. 42, no. 10, pp. 2771-2780, Oct. 1994.
    • (1994) IEEE Trans. Signal Processing , vol.42 , Issue.10 , pp. 2771-2780
    • Shin, D.C.1    Nikias, C.L.2
  • 20
    • 33144454801 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • Feb
    • S. Capkun and J. P. Hubaux, "Secure positioning in wireless networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 221-232, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.2 , pp. 221-232
    • Capkun, S.1    Hubaux, J.P.2
  • 22
    • 84858462584 scopus 로고    scopus 로고
    • emulation development kit. ARM Limited, Inc, Online, Available
    • (2005) ARM Secure SC200, smart card emulation development kit. ARM Limited, Inc. [Online]. Available: http://www.arm.com/
    • ARM Secure SC200, smart card
  • 24
    • 36248973942 scopus 로고    scopus 로고
    • ANSI X9.63, public key cryptography for the financial services industry: The elliptic curve key agreement and key transport protocols. National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov
    • (2001) ANSI X9.63, public key cryptography for the financial services industry: The elliptic curve key agreement and key transport protocols. National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov
  • 25
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on koblitz curves
    • Mar
    • J. A. Solinas, "Efficient arithmetic on koblitz curves," Designs, Codes and Cryptography, vol. 19, no. 2, pp. 195-249, Mar. 2000.
    • (2000) Designs, Codes and Cryptography , vol.19 , Issue.2 , pp. 195-249
    • Solinas, J.A.1
  • 27
    • 36248966814 scopus 로고    scopus 로고
    • W. J. Dixon, Analysis of extreme values, Annals of Mathematical Statistics, 2.1, pp. 488-506, 1950.
    • W. J. Dixon, "Analysis of extreme values," Annals of Mathematical Statistics, vol. 2.1, pp. 488-506, 1950.
  • 29
    • 0002344794 scopus 로고
    • Bootstrap methods: Another look at the jackknife
    • B. Efron, "Bootstrap methods: Another look at the jackknife," Annals of Statistics, vol. 7, pp. .1-26, 1979.
    • (1979) Annals of Statistics , vol.7 , pp. 1-26
    • Efron, B.1
  • 31
    • 84946031884 scopus 로고
    • Procedures for detecting outlying observations in samples
    • F. Grubbs, "Procedures for detecting outlying observations in samples," Technometrics, vol. 11, no. 1, pp. 1-21, 1969.
    • (1969) Technometrics , vol.11 , Issue.1 , pp. 1-21
    • Grubbs, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.