-
1
-
-
33645672701
-
Man-in-the-Middle in Tunnelled Authentication Protocols
-
Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, of, Springer
-
N. Asokan, Valtteri Niemi, and Kaisa Nyberg. Man-in-the-Middle in Tunnelled Authentication Protocols. In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, pages 28-41. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.3364
, pp. 28-41
-
-
Asokan, N.1
Niemi, V.2
Nyberg, K.3
-
2
-
-
20144372983
-
-
PhD thesis, School of Computing, Dublin City University, Dublin, Ireland
-
B. Aziz. A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems. PhD thesis, School of Computing, Dublin City University, Dublin, Ireland, 2003.
-
(2003)
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
-
-
Aziz, B.1
-
3
-
-
70449499601
-
-
nd Workshop on the Specification, Analysis and Validation for Emerging Technologies, number 94 in Datalogiske Skrifter, Copenhagen, Denmark, July 2002. Roskilde University.
-
nd Workshop on the Specification, Analysis and Validation for Emerging Technologies, number 94 in Datalogiske Skrifter, Copenhagen, Denmark, July 2002. Roskilde University.
-
-
-
-
4
-
-
20144371358
-
A static analysis of cryptographic processes: The denotational approach
-
August
-
Benjamin Aziz, Geoff Hamilton, and David Gray. A static analysis of cryptographic processes: The denotational approach. Journal of Logic and Algebraic Programming, 64(2):285-320, August 2005.
-
(2005)
Journal of Logic and Algebraic Programming
, vol.64
, Issue.2
, pp. 285-320
-
-
Aziz, B.1
Hamilton, G.2
Gray, D.3
-
5
-
-
18244395833
-
The two-phase commitment protocol in an extended pi-calculus. Electronic Notes in Theoretical Comp
-
Martin Berger and Kohei Honda. The two-phase commitment protocol in an extended pi-calculus. Electronic Notes in Theoretical Comp. Science, 39(1), 2000.
-
(2000)
Science
, vol.39
, Issue.1
-
-
Berger, M.1
Honda, K.2
-
6
-
-
84976295016
-
-
Stefan Brands and David Chaum. Distance-bounding protocols. In Tor Helleseth, editor, Proceedings of EURO-CRYPT' 93, Workshop on the Theory and Application of of Cryptographic Techniques, 765 of Lecture Notes in Computer Science, pages 344-359, Lofthus, Norway, May 1993. Springer.
-
Stefan Brands and David Chaum. Distance-bounding protocols. In Tor Helleseth, editor, Proceedings of EURO-CRYPT' 93, Workshop on the Theory and Application of of Cryptographic Techniques, volume 765 of Lecture Notes in Computer Science, pages 344-359, Lofthus, Norway, May 1993. Springer.
-
-
-
-
7
-
-
70449505404
-
-
th Annual Symposium on Logic in Computer Science, pages 246-265, Boston, MA, U.S.A., June 2001. IEEE Computer Society Press.
-
th Annual Symposium on Logic in Computer Science, pages 246-265, Boston, MA, U.S.A., June 2001. IEEE Computer Society Press.
-
-
-
-
8
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors, ESAS, of, Springer
-
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors, ESAS, volume 4357 of Lecture Notes in Computer Science, pages 83-97. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4357
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
10
-
-
47949132842
-
Discovering man-in-the-middle attacks in authentication protocols
-
Oct
-
Ratan K. Guha, Zeeshan Furqan, and Shahabuddin Muhammad. Discovering man-in-the-middle attacks in authentication protocols. Military Communications Conference, 2007. MILCOM 2007. IEEE, pages 1-7, Oct. 2007.
-
(2007)
Military Communications Conference, 2007. MILCOM 2007. IEEE
, pp. 1-7
-
-
Guha, R.K.1
Furqan, Z.2
Muhammad, S.3
-
11
-
-
33847329743
-
An RFID distance bounding protocol
-
Athens, Greece, September, ACM Press
-
Gerhard P. Hancke and Markus G. Kuhn. An RFID distance bounding protocol. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pages 67-73, Athens, Greece, September 2005. ACM Press.
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
12
-
-
56749181480
-
Attacks on time-of-flight distance bounding channels
-
New York, NY, USA, ACM
-
Gerhard P. Hancke and Markus G. Kuhn. Attacks on time-of-flight distance bounding channels. In WiSec '08: Proceedings of the first ACM conference on Wireless network security, pages 194-202, New York, NY, USA, 2008. ACM.
-
(2008)
WiSec '08: Proceedings of the first ACM conference on Wireless network security
, pp. 194-202
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
13
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Springer-Verlag
-
Chong Hee Kim, Gildas Avoine, Franois Koeune, François-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID Distance Bounding Protocol. In The 11th International Conference on Information Security and Cryptology - ICISC 2008, pages 98-115. Springer-Verlag, 2008.
-
(2008)
The 11th International Conference on Information Security and Cryptology - ICISC 2008
, pp. 98-115
-
-
Chong, H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
14
-
-
31344471100
-
-
Dennis Ku7die;gler. Man in the Middle Attacks on Bluetooth. In Rebecca N. Wright, editor, Financial Cryptography, 2742 of Lecture Notes in Computer Science, pages 149-161. Springer, 2003.
-
Dennis Ku7die;gler. "Man in the Middle" Attacks on Bluetooth. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 149-161. Springer, 2003.
-
-
-
-
15
-
-
0035075103
-
A cost-based framework for analysis of denial of service networks
-
Catherine Meadows. A cost-based framework for analysis of denial of service networks. Journal of Computer Security, 9(1/2):143-164, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
16
-
-
84882715141
-
-
Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, and Paul Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. Advances in Information Security: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 30, 2006.
-
Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, and Paul Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. Advances in Information Security: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 30, 2006.
-
-
-
-
17
-
-
11244304396
-
A man-in-the-middle attack on UMTS
-
New York, NY, USA, ACM
-
Ulrike Meyer and Susanne Wetzel. A man-in-the-middle attack on UMTS. In WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security, pages 90-97, New York, NY, USA, 2004. ACM.
-
(2004)
WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security
, pp. 90-97
-
-
Meyer, U.1
Wetzel, S.2
-
18
-
-
44049113210
-
A calculus of mobile processes (parts I & II)
-
September
-
Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes (parts I & II). Information and Computation, 100(1):1-77, September 1992.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
19
-
-
58049176948
-
Yet another secure distance-bounding protocol. Cryptology ePrint Archive
-
Report 2008/319
-
Ventzislav Nikov and Marc Vauclair. Yet another secure distance-bounding protocol. Cryptology ePrint Archive, Report 2008/319, 2008. http://eprint.iacr. org/.
-
(2008)
-
-
Nikov, V.1
Vauclair, M.2
-
20
-
-
0034875439
-
Defense against man-in-the-middle attack in client-server systems
-
IEEE Computer Society
-
Dimitrios N. Serpanos and Richard J. Lipton. Defense against man-in-the-middle attack in client-server systems. In ISCC, pages 9-14. IEEE Computer Society, 2001.
-
(2001)
ISCC
, pp. 9-14
-
-
Serpanos, D.N.1
Lipton, R.J.2
-
21
-
-
38349047971
-
Secure verification of location claims with simultaneous distance modification
-
editor, Springer
-
Vitaly Shmatikov and Ming-Hsiu Wang. Secure verification of location claims with simultaneous distance modification. In Iliano Cervesato, editor, ASIAN, volume 4846 of Lecture Notes in Computer Science, pages 181-195. Springer, 2007.
-
(2007)
ASIAN, volume 4846 of Lecture Notes in Computer Science
, pp. 181-195
-
-
Shmatikov, V.1
Wang, M.-H.2
-
22
-
-
33750297493
-
Location verification using secure distance bounding protocols
-
Washington DC, USA, November, IEEE Computer Society
-
Dave Singelée and Bart Preneel. Location verification using secure distance bounding protocols. In Proceedings of the 2005 IEEE International Workshop on Wireless and Sensor Networks Security, pages 834-840, Washington DC, USA, November 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 2005 IEEE International Workshop on Wireless and Sensor Networks Security
, pp. 834-840
-
-
Singelée, D.1
Preneel, B.2
-
24
-
-
33846283646
-
Hardening web browsers against man-in-the-middle and eavesdropping attacks
-
New York, NY, USA, ACM
-
Haidong Xia and José Carlos Brustoloni. Hardening web browsers against man-in-the-middle and eavesdropping attacks. In WWW '05: Proceedings of the 14th international conference on World Wide Web, pages 489-498, New York, NY, USA, 2005. ACM.
-
(2005)
WWW '05: Proceedings of the 14th international conference on World Wide Web
, pp. 489-498
-
-
Xia, H.1
Carlos Brustoloni, J.2
|