메뉴 건너뛰기




Volumn 6370 LNCS, Issue , 2010, Pages 220-238

Optimal security limits of RFID distance bounding protocols

Author keywords

distance bounding protocol; distance fraud; mafia fraud; RFID; security

Indexed keywords

DISTANCE BOUNDING; DISTANCE FRAUD; MAFIA FRAUD; RFID; SECURITY;

EID: 78650125351     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16822-2_18     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 1
    • 77649240515 scopus 로고    scopus 로고
    • RFID Distance Bounding Multistate Enhancement
    • Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
    • Avoine, G., Floerkemeier, C., Martin, B.: RFID Distance Bounding Multistate Enhancement. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 290-307. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5922 , pp. 290-307
    • Avoine, G.1    Floerkemeier, C.2    Martin, B.3
  • 2
    • 70350424442 scopus 로고    scopus 로고
    • An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-acceptance Rate and Memory Requirement
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Avoine, G., Tchamkerten, A.: An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-acceptance Rate and Memory Requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 3
    • 85030309636 scopus 로고
    • Identification Tokens - or: Solving the Chess Grandmaster Problem
    • Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
    • Beth, T., Desmedt, Y.: Identification Tokens - or: Solving the Chess Grandmaster Problem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 169-177. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 169-177
    • Beth, T.1    Desmedt, Y.2
  • 4
    • 84976295016 scopus 로고
    • Distance-Bounding Protocols
    • Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance-Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 6
    • 0013398251 scopus 로고
    • Major security problems with the' Unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
    • Desmedt, Y.: Major security problems with the' Unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In: SecuriCom 1988, pp. 15-17 (1988)
    • (1988) SecuriCom 1988 , pp. 15-17
    • Desmedt, Y.1
  • 7
    • 85028745474 scopus 로고
    • Special uses and abuses of the fiat-shamir passport protocol
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the fiat-shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 21-39
    • Desmedt, Y.1    Goutier, C.2    Bengio, S.3
  • 12
    • 71549138804 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent relay attacks
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 119-133
    • Kim, C.H.1    Avoine, G.2
  • 13
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID Distance Bounding Protocol
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 14
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing 8(9), 1227-1232 (2008)
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.9 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 15
    • 58049176948 scopus 로고    scopus 로고
    • Yet Another Secure Distance-Bounding Protocol
    • ePrint Archive, Report 2008/319
    • Nikov, V., Vauclair, M.: Yet Another Secure Distance-Bounding Protocol. Cryptology ePrint Archive, Report 2008/319 (2008)
    • (2008) Cryptology
    • Nikov, V.1    Vauclair, M.2
  • 17
    • 38149028509 scopus 로고    scopus 로고
    • Distance Bounding in Noisy Environments
    • Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
    • Singelée, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101-115. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4572 , pp. 101-115
    • Singelée, D.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.