메뉴 건너뛰기




Volumn 6370 LNCS, Issue , 2010, Pages 239-257

The Poulidor distance-bounding protocol

Author keywords

authentication; distance fraud; distance bounding protocol; graph; mafia fraud; RFID

Indexed keywords

DISTANCE FRAUD; DISTANCE-BOUNDING PROTOCOL; GRAPH; MAFIA FRAUD; RFID;

EID: 78650079491     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16822-2_19     Document Type: Conference Paper
Times cited : (37)

References (12)
  • 3
    • 70350424442 scopus 로고    scopus 로고
    • An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 4
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 5
    • 85028745474 scopus 로고
    • Special uses and abuses of the fiat-shamir passport protocol
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the fiat-shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 21-39
    • Desmedt, Y.1    Goutier, C.2    Bengio, S.3
  • 7
    • 71549138804 scopus 로고    scopus 로고
    • RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 119-133
    • Kim, C.H.1    Avoine, G.2
  • 8
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID Distance Bounding Protocol
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 10
    • 58049137098 scopus 로고    scopus 로고
    • Security Analysis of Tu and Piramuthu's Protocol
    • Tangier, Morocco, IEEE Computer Society Press, Los Alamitos November
    • Munilla, J., Peinado, A.: Security Analysis of Tu and Piramuthu's Protocol. In: New Technologies, Mobility and Security, NTMS 2008, Tangier, Morocco, pp. 1-5. IEEE Computer Society Press, Los Alamitos (November 2008)
    • (2008) New Technologies, Mobility and Security, NTMS 2008 , pp. 1-5
    • Munilla, J.1    Peinado, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.