-
3
-
-
70349451691
-
Confidence in smart token proximity: Relay attacks revisited
-
G. P. Hancke, K. Mayes, and K. Markantonakis, "Confidence in smart token proximity: relay attacks revisited," Comput. Security, vol. 28, no. 7, pp. 615-627, 2009.
-
(2009)
Comput. Security
, vol.28
, Issue.7
, pp. 615-627
-
-
Hancke, G.P.1
Mayes, K.2
Markantonakis, K.3
-
5
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
Springer
-
Y. Desmedt, C. Goutier, and S. Bengio, "Special uses and abuses of the Fiat-Shamir passport protocol," in CRYPTO, ser. Lecture Notes in Computer Science, vol. 293.x. Springer, 1987, pp. 21-39.
-
(1987)
CRYPTO, Ser. Lecture Notes in Computer Science
, vol.293
, Issue.10
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
8
-
-
84976295016
-
Distance-bounding protocols
-
Springer
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Proc. Annu. Int. Conf. Theory Applicat. Cryptographic Tech. (EUROCRYPT), ser. Lecture Notes in Computer Science, vol. 765. Springer, 1993, pp. 344- 359.
-
(1993)
Proc. Annu. Int. Conf. Theory Applicat. Cryptographic Tech. (EUROCRYPT), Ser. Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
9
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels," Wireless Commun. Mobile Comput., vol. 8, no. 9, pp. 1227-1232, 2008.
-
(2008)
Wireless Commun. Mobile Comput.
, vol.8
, Issue.9
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
10
-
-
71549138804
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
Springer
-
C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks," in Proc. Int. Conf. Crytology Netw. Security (CANS), ser. Lecture Notes in Comput. Science, vol. 5888. Springer, 2009, pp. 119-133.
-
(2009)
Proc. Int. Conf. Crytology Netw. Security (CANS), Ser. Lecture Notes in Comput. Science
, vol.5888
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
11
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
S. Capkun, L. Buttyán, and J.-P. Hubaux, "SECTOR: secure tracking of node encounters in multi-hop wireless networks," in Security Ad Hoc Sensor Netw. (SASN), 2003, pp. 21-32.
-
(2003)
Security Ad Hoc Sensor Netw. (SASN)
, pp. 21-32
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
12
-
-
38149028509
-
Distance bounding in noisy environments
-
Springer
-
D. Singelée and B. Preneel, "Distance bounding in noisy environments," in Proc. European Conf. Security Privacy Ad-Hoc Sensor Netw. (ESAS), ser. Lecture Notes Computer Science, vol. 4572. Springer, 2007, pp. 101-115.
-
(2007)
Proc. European Conf. Security Privacy Ad-Hoc Sensor Netw. (ESAS), Ser. Lecture Notes Computer Science
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
13
-
-
67049155493
-
The swiss-knife RFID distance bounding protocol
-
Springer
-
C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira, "The swiss-knife RFID distance bounding protocol," in Proc. Inf. Security Cryptology (ICISC), ser. Lecture Notes Computer Science, vol. 5461. Springer, 2008, pp. 98-115.
-
(2008)
Proc. Inf. Security Cryptology (ICISC), Ser. Lecture Notes Computer Science
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
15
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
Springer
-
J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore, "So near and yet so far: distance-bounding attacks in wireless networks," in Proc. European Conf. Security Privacy Ad-Hoc Sensor Netw. (ESAS), ser. Lecture Notes Comput. Science, vol. 4357. Springer, 2006, pp. 83-97.
-
(2006)
Proc. European Conf. Security Privacy Ad-Hoc Sensor Netw. (ESAS), Ser. Lecture Notes Comput. Science
, vol.4357
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
16
-
-
62949229889
-
-
CRC Press
-
S. A. Ahson and M. Ilyas, RFID Handbook: Applications, Technology, Security, Privacy. CRC Press, 2008.
-
(2008)
RFID Handbook: Applications, Technology, Security, Privacy
-
-
Ahson, S.A.1
Ilyas, M.2
-
19
-
-
33745738746
-
One-time sensors: A novel concept to mitigate node-capture attacks
-
DOI 10.1007/11601494-7, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
-
K. Bicakci, C. Gamage, B. Crispo, and A. S. Tanenbaum, "One-time sensors: a novel concept to mitigate node-capture attacks," in Proc. European Conf. Security Privacy Ad-Hoc Sensor Netw. (ESAS), ser. Lecture Notes Comput. Science, vol. 3813. Springer, 2005, pp. 80-90. (Pubitemid 44012975)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3813
, pp. 80-90
-
-
Bicakci, K.1
Gamage, C.2
Crispo, B.3
Tanenbaum, A.S.4
-
20
-
-
80052380132
-
The AESCMAC algorithm
-
June
-
J. H. Song, R. Poovendran, R. Poovendran, and T. Iwata, "The AESCMAC algorithm," RFC 4493, IETF, June 2006.
-
(2006)
RFC
, vol.4493
-
-
Song, J.H.1
Poovendran, R.2
Poovendran, R.3
Iwata, T.4
-
21
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
Springer
-
G. Avoine and A. Tchamkerten, "An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement," in Proc. Int. Conf. Inf. Security (ISC), ser. Lecture Notes Comput. Science, vol. 5735. Springer, 2009, pp. 250-261.
-
(2009)
Proc. Int. Conf. Inf. Security (ISC), Ser. Lecture Notes Comput. Science
, vol.5735
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
|