메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Towards more efficient distance bounding protocols for use in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DISTANCE BOUNDING; DISTANCE ESTIMATION; FORMAL ANALYSIS; MESSAGE COMPLEXITY; ON TIME; SECURE PROTOCOLS; SECURITY PROPERTIES;

EID: 50049102546     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOMW.2006.359532     Document Type: Conference Paper
Times cited : (10)

References (13)
  • 1
    • 50049129639 scopus 로고    scopus 로고
    • MSSI Completes Phase II SBIR Contract for UWB-Based Urban Positioning System ('UPS') - Awarded $1M Phase II Plus, June 27 2006.
    • MSSI Completes Phase II SBIR Contract for UWB-Based Urban Positioning System ('UPS') - Awarded $1M Phase II Plus, June 27 2006.
  • 2
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Advances in Cryptology, Eurocrypt '93, Springer- Verlag
    • S. Brands and D. Chaum. Distance-bounding protocols. InAdvances in Cryptology - Eurocrypt '93. LNCS 765, Springer- Verlag, 1995.
    • (1995) LNCS , vol.765
    • Brands, S.1    Chaum, D.2
  • 5
    • 28144435566 scopus 로고    scopus 로고
    • An encapsulated authentication logic for reasoning about key distribution protocols
    • Joshua Guttman, editor, IEEE Computer Society Press
    • Iliano Cervesato, Catherine Meadows, and Dusko Pavlovic. An encapsulated authentication logic for reasoning about key distribution protocols. In Joshua Guttman, editor, Proceedings of CSFW 2005, pages 48-61. IEEE Computer Society Press, 2005.
    • (2005) Proceedings of CSFW , pp. 48-61
    • Cervesato, I.1    Meadows, C.2    Pavlovic, D.3
  • 6
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' Feige-Shamir proofs of identity and how to overcome them
    • Y. Desmedt. Major security problems with the 'unforgeable' Feige-Shamir proofs of identity and how to overcome them. In Proc. Securicom '88, 1988.
    • (1988) Proc. Securicom '88
    • Desmedt, Y.1
  • 8
    • 0028424892 scopus 로고
    • The temporal logic of actions
    • L. Lamport. The temporal logic of actions. Acm TOPLAS, 16(3), 1994.
    • (1994) Acm TOPLAS , vol.16 , Issue.3
    • Lamport, L.1
  • 10
    • 33745772467 scopus 로고    scopus 로고
    • Deriving, attacking and defending the GDOI protocol
    • Proc. ESORICS, Springer-Verlag
    • C. Meadows and D. Pavlovic. Deriving, attacking and defending the GDOI protocol. In Proc. ESORICS 2004, pages 33-53. Springer-Verlag LNCS 3193, 2004.
    • (2004) LNCS , vol.3193 , pp. 33-53
    • Meadows, C.1    Pavlovic, D.2
  • 11
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • Summer/Fall
    • Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. The TESLA broadcast authentication protocol. RSA Cryptobytes, 5(2), Summer/Fall 2002.
    • (2002) RSA Cryptobytes , vol.5 , Issue.2
    • Perrig, A.1    Ran Canetti, J.D.T.2    Song, D.3
  • 13
    • 31344439338 scopus 로고    scopus 로고
    • Secure, private proofs of location
    • Technical Report TR-667-03, Princeton
    • B. Waters and E. Felten. Secure, private proofs of location. Technical Report TR-667-03, Princeton, 2003.
    • (2003)
    • Waters, B.1    Felten, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.