메뉴 건너뛰기




Volumn , Issue , 2008, Pages 149-159

Location privacy of distance bounding protocols

Author keywords

Distance bounding; Information leakage; Wireless security

Indexed keywords

COMMUNICATION PARTNERS; DISTANCE BOUNDING; DISTANCE INFORMATION; HIGHLY SENSITIVE; INFORMATION DISTANCE; INFORMATION LEAKAGE; KEY ESTABLISHMENTS; LOCATION PRIVACY; LOCATION-AWARE APPLICATION; NODE LOCATION; SECURITY CRITICAL APPLICATIONS; UPPER BOUND; WIRELESS SECURITY;

EID: 70349272427     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455791     Document Type: Conference Paper
Times cited : (57)

References (33)
  • 1
    • 70349298085 scopus 로고    scopus 로고
    • QPSK modulation demystified
    • QPSK modulation demystified, http://www.maxim-ic.com/appnotes.cfm/ appnote-number/686/,2000.
    • (2000)
  • 5
    • 70349282772 scopus 로고    scopus 로고
    • Liang Chang, Fuping Wang, and Zanji Wang. Detection of dsss signal in non-cooperative communications. Communication Technology, 2006. ICGT '06. International Conference on, pages 1-4, Nov. 2006.
    • Liang Chang, Fuping Wang, and Zanji Wang. Detection of dsss signal in non-cooperative communications. Communication Technology, 2006. ICGT '06. International Conference on, pages 1-4, Nov. 2006.
  • 7
    • 0037004354 scopus 로고    scopus 로고
    • Passive radar localization by time difference of arrival
    • 2, 7-10 Oct
    • A. Dersan and Y. Tanik. Passive radar localization by time difference of arrival. MILCOM 2002. Proceedings, 2:1251-1257 vol.2, 7-10 Oct. 2002.
    • (2002) MILCOM 2002. Proceedings , vol.2 , pp. 1251-1257
    • Dersan, A.1    Tanik, Y.2
  • 8
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • Saar Drimer and Steven J. Murdoch. Keep your enemies close: Distance bounding against smartcard relay attacks. In Proceedings of the USENIX Security Symposium 2007. 2007.
    • (2007) Proceedings of the USENIX Security Symposium , pp. 2007
    • Drimer, S.1    Murdoch, S.J.2
  • 13
    • 0032625075 scopus 로고    scopus 로고
    • Dynamic frequency hopping in wireless cellular systems-simulations of full-replacement and reduced-overhead methods
    • 2, Jul
    • Z. Kostic and I. Marie. Dynamic frequency hopping in wireless cellular systems-simulations of full-replacement and reduced-overhead methods. Vehicular Technology Conference, 1999 IEEE 49th, 2:914-918 vol.2, Jul 1999.
    • (1999) Vehicular Technology Conference, 1999 IEEE 49th , vol.2 , pp. 914-918
    • Kostic, Z.1    Marie, I.2
  • 15
    • 50049102546 scopus 로고    scopus 로고
    • Towards more efficient distance bounding protocols for use in sensor networks
    • Aug. 28 -Sept. 1
    • Catherine Meadows, Paul Syverson, and LiWu Chang. Towards more efficient distance bounding protocols for use in sensor networks. Securecomm, pages 1-5, Aug. 28 2006-Sept. 1 2006.
    • (2006) Securecomm , pp. 1-5
    • Meadows, C.1    Syverson, P.2    Chang, L.3
  • 16
    • 70349299614 scopus 로고    scopus 로고
    • Jorge Munilla, Andres Ortiz, and Alberto Peinado. Distance bounding protocols with void-challenges for RFID. Printed handout at the Workshop on RFID Security - RFIDSec 06, July 2006.
    • Jorge Munilla, Andres Ortiz, and Alberto Peinado. Distance bounding protocols with void-challenges for RFID. Printed handout at the Workshop on RFID Security - RFIDSec 06, July 2006.
  • 23
    • 33750297493 scopus 로고    scopus 로고
    • D. Singelee and B. Preneel. Location verification using secure distance bounding protocols. Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on, pages 7 pp.-, 7-10 Nov. 2005.
    • D. Singelee and B. Preneel. Location verification using secure distance bounding protocols. Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on, pages 7 pp.-, 7-10 Nov. 2005.
  • 26
    • 70350402042 scopus 로고    scopus 로고
    • UWB-bascd Secure Ranging and Localization
    • Technical Report 586, ETH Zurich, January
    • Nils Tippcnhaucr and Srdjan Čapkun. UWB-bascd Secure Ranging and Localization. Technical Report 586, ETH Zurich, January 2008.
    • (2008)
    • Tippcnhaucr, N.1    Čapkun, S.2
  • 28
    • 11244338686 scopus 로고    scopus 로고
    • Securing position in sensor networks
    • Technical Report 200444, EPFL Swiss Federal Institute of Technology in Lausanne
    • S. Čapkun and J.-P. Hubaux. Securing position in sensor networks. Technical Report 200444, EPFL (Swiss Federal Institute of Technology in Lausanne, 2004.
    • (2004)
    • Čapkun, S.1    Hubaux, J.-P.2
  • 31
    • 36348971248 scopus 로고    scopus 로고
    • Hybrid toa/rssi wireless location with unconstrained nonlinear optimization for indoor uwb channels
    • 11-15 March
    • Chin-Dcr Wann and Hao-Chun Chin. Hybrid toa/rssi wireless location with unconstrained nonlinear optimization for indoor uwb channels. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pages 3940-3945, 11-15 March 2007.
    • (2007) Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE , pp. 3940-3945
    • Wann, C.-D.1    Chin, H.-C.2
  • 32
    • 0000937029 scopus 로고
    • Communications, IEEE Transactions on [legacy, pre - 1988]
    • 475-483, Dec
    • R. Ward. Acquisition of pseudonoise signals by sequential estimation. Communications, IEEE Transactions on [legacy, pre - 1988], 13(4):475-483, Dec 1965.
    • (1965) , vol.13 , Issue.4
    • Ward, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.