-
3
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
4
-
-
84976295016
-
Distance-bounding protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the fiat-shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
6
-
-
33847329743
-
An RFID Distance Bounding Protocol
-
IEEE Computer Society Press, Los Alamitos September
-
Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm 2005, Athens, Greece, pp. 67-73. IEEE Computer Society Press, Los Alamitos (September 2005)
-
(2005)
Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm 2005, Athens, Greece
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
-
7
-
-
71549138804
-
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
8
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
9
-
-
38149113034
-
Distance Bounding Protocols with Void-Challenges for RFID
-
Munilla, J., Ortiz, A., Peinado, A.: Distance Bounding Protocols with Void-Challenges for RFID. In: Workshop on RFID Security, RFIDSec 2006, Graz, Austria (July 2006) Ecrypt
-
Workshop on RFID Security, RFIDSec 2006, Graz, Austria (July 2006) Ecrypt
-
-
Munilla, J.1
Ortiz, A.2
Peinado, A.3
-
10
-
-
58049137098
-
Security Analysis of Tu and Piramuthu's Protocol
-
Tangier, Morocco, IEEE Computer Society Press, Los Alamitos November
-
Munilla, J., Peinado, A.: Security Analysis of Tu and Piramuthu's Protocol. In: New Technologies, Mobility and Security, NTMS 2008, Tangier, Morocco, pp. 1-5. IEEE Computer Society Press, Los Alamitos (November 2008)
-
(2008)
New Technologies, Mobility and Security, NTMS 2008
, pp. 1-5
-
-
Munilla, J.1
Peinado, A.2
-
11
-
-
34748825630
-
Detecting relay attacks with timing based protocols
-
Bao, F., Miller, S. (eds.) ACM Press, New York March
-
Reid, J., Neito, J.G., Tang, T., Senadji, B.: Detecting relay attacks with timing based protocols. In: Bao, F., Miller, S. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, Republic of Singapore, pp. 204-213. ACM Press, New York (March 2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, Republic of Singapore
, pp. 204-213
-
-
Reid, J.1
Neito, J.G.2
Tang, T.3
Senadji, B.4
|