-
1
-
-
77649240515
-
RFID Distance Bounding Multistate Enhancement
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Avoine, G., Floerkemeier, C., Martin, B.: RFID Distance Bounding Multistate Enhancement. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 290-307. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 290-307
-
-
Avoine, G.1
Floerkemeier, C.2
Martin, B.3
-
2
-
-
70350424442
-
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-acceptance Rate and Memory Requirement
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Avoine, G., Tchamkerten, A.: An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-acceptance Rate and Memory Requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
3
-
-
85030309636
-
Identification Tokens - or: Solving the Chess Grandmaster Problem
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
Beth, T., Desmedt, Y.: Identification Tokens - or: Solving the Chess Grandmaster Problem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 169-177. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 169-177
-
-
Beth, T.1
Desmedt, Y.2
-
4
-
-
84976295016
-
Distance-Bounding Protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
4544259841
-
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
-
ACM Press, New York October
-
Capkun, S., Butty'an, L., Hubaux, J.-P.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, pp. 21-32. ACM Press, New York (October 2003)
-
(2003)
ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA
, pp. 21-32
-
-
Capkun, S.1
Butty'an, L.2
Hubaux, J.-P.3
-
6
-
-
0013398251
-
Major security problems with the' Unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
-
Desmedt, Y.: Major security problems with the' Unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In: SecuriCom 1988, pp. 15-17 (1988)
-
(1988)
SecuriCom 1988
, pp. 15-17
-
-
Desmedt, Y.1
-
7
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the fiat-shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
9
-
-
33847329743
-
An RFID Distance Bounding Protocol
-
IEEE Computer Society Press, Los Alamitos September
-
Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm 2005, Athens, Greece. IEEE Computer Society Press, Los Alamitos (September 2005)
-
(2005)
Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm 2005, Athens, Greece
-
-
Hancke, G.1
Kuhn, M.2
-
11
-
-
63149186354
-
Distance Bounding Protocol for Multiple RFID Tag Authentication
-
IEEE Computer Society Press, Los Alamitos December
-
Kapoor, G., Zhou, W., Piramuthu, S.: Distance Bounding Protocol for Multiple RFID Tag Authentication. In: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, Shanghai, China, pp. 115-120. IEEE Computer Society Press, Los Alamitos (December 2008)
-
(2008)
Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, Shanghai, China
, pp. 115-120
-
-
Kapoor, G.1
Zhou, W.2
Piramuthu, S.3
-
12
-
-
71549138804
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
13
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
14
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing 8(9), 1227-1232 (2008)
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.9
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
15
-
-
58049176948
-
Yet Another Secure Distance-Bounding Protocol
-
ePrint Archive, Report 2008/319
-
Nikov, V., Vauclair, M.: Yet Another Secure Distance-Bounding Protocol. Cryptology ePrint Archive, Report 2008/319 (2008)
-
(2008)
Cryptology
-
-
Nikov, V.1
Vauclair, M.2
-
16
-
-
34748825630
-
Detecting relay attacks with timing based protocols
-
Bao, F., Miller, S. (eds.) ACM Press, New York March
-
Reid, J., Gonzalez Neito, J., Tang, T., Senadji, B.: Detecting relay attacks with timing based protocols. In: Bao, F., Miller, S. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, Republic of Singapore, pp. 204-213. ACM Press, New York (March 2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, Republic of Singapore
, pp. 204-213
-
-
Reid, J.1
Gonzalez Neito, J.2
Tang, T.3
Senadji, B.4
-
17
-
-
38149028509
-
Distance Bounding in Noisy Environments
-
Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
-
Singelée, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101-115. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
|