메뉴 건너뛰기




Volumn 10, Issue 2, 2011, Pages 592-601

Distance bounding protocol for mutual authentication

Author keywords

distance bounding protocol; mafia fraud attack; mutual authentication; relay attack; Security

Indexed keywords

DISTANCE BOUNDING; MAFIA FRAUD; MUTUAL AUTHENTICATION; RELAY ATTACK; SECURITY;

EID: 79951677671     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2010.120610.100491     Document Type: Article
Times cited : (28)

References (21)
  • 3
    • 70349451691 scopus 로고    scopus 로고
    • Confidence in smart token proximity: Relay attacks revisited
    • G. P. Hancke, K. Mayes, and K. Markantonakis, "Confidence in smart token proximity: relay attacks revisited," Comput. Security, vol. 28, no. 7, pp. 615-627, 2009.
    • (2009) Comput. Security , vol.28 , Issue.7 , pp. 615-627
    • Hancke, G.P.1    Mayes, K.2    Markantonakis, K.3
  • 5
    • 85028745474 scopus 로고
    • Special uses and abuses of the Fiat-Shamir passport protocol
    • Springer
    • Y. Desmedt, C. Goutier, and S. Bengio, "Special uses and abuses of the Fiat-Shamir passport protocol," in CRYPTO, ser. Lecture Notes in Computer Science, vol. 293.x. Springer, 1987, pp. 21-39.
    • (1987) CRYPTO, Ser. Lecture Notes in Computer Science , vol.293 , Issue.10 , pp. 21-39
    • Desmedt, Y.1    Goutier, C.2    Bengio, S.3
  • 9
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels," Wireless Commun. Mobile Comput., vol. 8, no. 9, pp. 1227-1232, 2008.
    • (2008) Wireless Commun. Mobile Comput. , vol.8 , Issue.9 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 11
  • 21
    • 70350424442 scopus 로고    scopus 로고
    • An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
    • Springer
    • G. Avoine and A. Tchamkerten, "An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement," in Proc. Int. Conf. Inf. Security (ISC), ser. Lecture Notes Comput. Science, vol. 5735. Springer, 2009, pp. 250-261.
    • (2009) Proc. Int. Conf. Inf. Security (ISC), Ser. Lecture Notes Comput. Science , vol.5735 , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.