메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Key establishment using secure distance bounding protocols

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMMUNICATION CHANNELS (INFORMATION THEORY); LAWS AND LEGISLATION; LOCAL AREA NETWORKS; MOBILE DEVICES; NETWORK PROTOCOLS; PERSONAL COMMUNICATION SYSTEMS; PORTABLE EQUIPMENT; TELECOMMUNICATION EQUIPMENT; TELECOMMUNICATION NETWORKS; UBIQUITOUS COMPUTING; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50249103390     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBIQ.2007.4451066     Document Type: Conference Paper
Times cited : (11)

References (26)
  • 3
    • 23944521144 scopus 로고    scopus 로고
    • Manual Authentication for Wireless Devices
    • C. Gehrmann, C. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," RSA Cryptobytes, vol. 7, no. 1, pp. 29-37, 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 4
    • 34247333484 scopus 로고    scopus 로고
    • The Ephemeral Pairing Problem
    • Financial Cryptography, Springer-Verlag
    • J. H. Hoepman, "The Ephemeral Pairing Problem," in Financial Cryptography, ser. Lecture Notes in Computer Science, LNCS 3110. Springer-Verlag, 2004, pp. 212-226.
    • (2004) ser. Lecture Notes in Computer Science, LNCS , vol.3110 , pp. 212-226
    • Hoepman, J.H.1
  • 5
    • 24644472550 scopus 로고    scopus 로고
    • Ephemeral Pairing on Anonymous Networks
    • Proceedings of the 2nd International Conference on Security in Pervasive Computing SPC '05, Springer-Verlag
    • _, "Ephemeral Pairing on Anonymous Networks," in Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC '05), ser. Lecture Notes in Computer Science, LNCS 3450. Springer-Verlag, 2005, pp. 101-116.
    • (2005) ser. Lecture Notes in Computer Science, LNCS , vol.3450 , pp. 101-116
    • Hoepman, J.H.1
  • 6
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
    • Proceedings of the 7th International Workshop on Security Protocols, Springer-Verlag
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks," in Proceedings of the 7th International Workshop on Security Protocols, ser. Lecture Notes in Computer Science, LNCS 1796. Springer-Verlag, 1999, pp. 172-182.
    • (1999) ser. Lecture Notes in Computer Science, LNCS , vol.1796 , pp. 172-182
    • Stajano, F.1    Anderson, R.2
  • 10
    • 24644434353 scopus 로고    scopus 로고
    • Security in Personal Area Networks
    • IEEE
    • C. Gehrmann and K. Nyberg, "Security in Personal Area Networks," in Security for Mobility. IEEE, 2004, pp. 191-230.
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 11
    • 33749614144 scopus 로고    scopus 로고
    • D. Singelée and B. Preneel, Improved Pairing Protocol for Bluetooth, in Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06), ser. Lecture Notes in Computer Science, LNCS 4104. Springer-Verlag, 2006, pp. 252-265.
    • D. Singelée and B. Preneel, "Improved Pairing Protocol for Bluetooth," in Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06), ser. Lecture Notes in Computer Science, LNCS 4104. Springer-Verlag, 2006, pp. 252-265.
  • 13
    • 84949953635 scopus 로고    scopus 로고
    • The Resurrecting Duckling - what next?
    • Proceedings of the 8th International Workshop on Security Protocols, Springer-Verlag
    • F. Stajano, "The Resurrecting Duckling - what next?" in Proceedings of the 8th International Workshop on Security Protocols, ser. Lecture Notes in Computer Science, LNCS 2133. Springer-Verlag, 2001, pp. 204-214.
    • (2001) ser. Lecture Notes in Computer Science, LNCS , vol.2133 , pp. 204-214
    • Stajano, F.1
  • 16
    • 35248872559 scopus 로고    scopus 로고
    • Validating and Securing Spontaneous Associations between Wireless Devices
    • Proceedings of the 6th Information Security Conference ISC '03, Springer-Verlag
    • T. Kindberg and K. Zhang, "Validating and Securing Spontaneous Associations between Wireless Devices," in Proceedings of the 6th Information Security Conference (ISC '03), ser. Lecture Notes in Computer Science, LNCS 2851. Springer-Verlag, 2003, pp. 44-53.
    • (2003) ser. Lecture Notes in Computer Science, LNCS , vol.2851 , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 19
    • 0033872896 scopus 로고    scopus 로고
    • RADAR: An In-Building RF-based User Location and Tracking System
    • P. Bahl and V. Padmanabhan, "RADAR: An In-Building RF-based User Location and Tracking System," in Proceedings of IEEE INFOCOM '00, vol. 2, 2000, pp. 775-784.
    • (2000) Proceedings of IEEE INFOCOM '00 , vol.2 , pp. 775-784
    • Bahl, P.1    Padmanabhan, V.2
  • 21
    • 84976295016 scopus 로고
    • Distance-Bounding Protocols
    • Advances in Cryptology, EUROCRYPT '93, Springer-Verlag
    • S. Brands and D. Chaum, "Distance-Bounding Protocols," in Advances in Cryptology - EUROCRYPT '93, ser. Lecture Notes in Computer Science, LNCS 765. Springer-Verlag, 1994, pp. 344-359.
    • (1994) ser. Lecture Notes in Computer Science, LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 22
    • 0013398251 scopus 로고
    • Major Security Problems with the " Unforgeable" (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them
    • Y. Desmedt, "Major Security Problems with the " Unforgeable" (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them," in Proceedings of SecuriCom '88, 1988, pp. 15-17.
    • (1988) Proceedings of SecuriCom '88 , pp. 15-17
    • Desmedt, Y.1
  • 24
    • 84876367662 scopus 로고    scopus 로고
    • So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
    • Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks ESAS '06, Springer-Verlag
    • J. Clulow, G. Hancke, M. Kuhn, and T. Moore, "So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks," in Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS '06), ser. Lecture Notes in Computer Science, LNCS 4357. Springer-Verlag, 2006, pp. 83-97.
    • (2006) ser. Lecture Notes in Computer Science, LNCS , vol.4357 , pp. 83-97
    • Clulow, J.1    Hancke, G.2    Kuhn, M.3    Moore, T.4
  • 26
    • 38149028509 scopus 로고    scopus 로고
    • Distance Bounding in Noisy Environments
    • To Appear in the Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks ESAS '07, Springer-Verlag
    • D. Singelée and B. Preneel, "Distance Bounding in Noisy Environments," in To Appear in the Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS '07), ser. Lecture Notes in Computer Science, LNCS 4572. Springer-Verlag, 2007.
    • (2007) ser. Lecture Notes in Computer Science, LNCS , vol.4572
    • Singelée, D.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.