-
1
-
-
79952262142
-
A Framework for Analyzing RFID Distance Bounding Protocols
-
Avoine, G., Bingöl, M.A., Kardaş, S., Lauradoux, C., Martin, B.: A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security - Special Issue on RFID System Security (2010)
-
(2010)
Journal of Computer Security - Special Issue on RFID System Security
-
-
Avoine, G.1
Bingöl, M.A.2
Kardaş, S.3
Lauradoux, C.4
Martin, B.5
-
2
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Avoine, G., Tchamkerten, A.: An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
3
-
-
84976295016
-
Distance Bounding Protocols
-
Extended Abstract. Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance Bounding Protocols (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
Capkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN, pp. 21-32 (2003)
-
(2003)
SASN
, pp. 21-32
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.P.3
-
6
-
-
85028745474
-
Special Uses and Abuses of the Fiat Shamir Passport Protocol
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y.G., Goutier, C., Bengio, S.: Special Uses and Abuses of the Fiat Shamir Passport Protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.G.1
Goutier, C.2
Bengio, S.3
-
8
-
-
0004239952
-
-
John Wiley and Sons, Chichester
-
Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (2003)
-
(2003)
RFID Handbook
-
-
Finkenzeller, K.1
-
10
-
-
33847329743
-
An RFID Distance Bounding Protocol
-
IEEE, IEEE Computer Society, Los Alamitos
-
Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm 2005, Athens, Greece, IEEE, pp. 67-73. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm 2005, Athens, Greece
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
-
11
-
-
78650125351
-
Optimal Security Limits of RFID Distance Bounding Protocols
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Kara, O., Kardaş, S., Bingöl, M.A., Avoine, G.: Optimal Security Limits of RFID Distance Bounding Protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 220-238. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 220-238
-
-
Kara, O.1
Kardaş, S.2
Bingöl, M.A.3
Avoine, G.4
-
12
-
-
33847269759
-
Picking Virtual Pockets Using Relay Attacks on Contactless Smartcard Systems
-
IEEE, IEEE Computer Society, Los Alamitos
-
Kfir, Z., Wool, A.: Picking Virtual Pockets Using Relay Attacks on Contactless Smartcard Systems. In: Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm 2005, Athens, Greece, IEEE, pp. 67-73. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm 2005, Athens, Greece
, pp. 67-73
-
-
Kfir, Z.1
Wool, A.2
-
13
-
-
71549138804
-
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
14
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Lee, P., Cheon, J. (eds.) ICISC 2008. Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P., Cheon, J. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
15
-
-
77956135384
-
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. Springer, Heidelberg
-
Melia-Segui, J., Garcia-Alfaro, J., Herrera-Joancomarti, J.: Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 34-46. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6054
, pp. 34-46
-
-
Melia-Segui, J.1
Garcia-Alfaro, J.2
Herrera-Joancomarti, J.3
-
16
-
-
55349135872
-
Distance Bounding Protocols for RFID Enhanced by using Void-Challenges and Analysis in Noisy Channels
-
Munilla, J., Peinado, A.: Distance Bounding Protocols for RFID Enhanced by using Void-Challenges and Analysis in Noisy Channels. Wireless Communications and Mobile Computing 8, 1227-1232 (2008)
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
17
-
-
76549120985
-
Attacks on a distance bounding protocol
-
Munilla, J., Peinado, A.: Attacks on a distance bounding protocol. Computer Communications 33, 884-889 (2010)
-
(2010)
Computer Communications
, vol.33
, pp. 884-889
-
-
Munilla, J.1
Peinado, A.2
-
18
-
-
58049176948
-
Yet Another Secure Distance-Bounding Protocol
-
Report 2008/319
-
Nikov, V., Vauclair, M.: Yet Another Secure Distance-Bounding Protocol. Cryptology ePrint Archive, Report 2008/319 (2008), http://eprint.iacr.org/
-
(2008)
Cryptology EPrint Archive
-
-
Nikov, V.1
Vauclair, M.2
-
19
-
-
79952268709
-
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
-
arXiv.org
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., van der Lubbe, J.C.A.: Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. arXiv.org, Computer Science, Cryptography and Security (2009)
-
(2009)
Computer Science, Cryptography and Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Van Der Lubbe, J.C.A.4
-
20
-
-
34748825630
-
Detecting Relay Attacks with Timing Based Protocols
-
Bao, F., Miller, S. (eds.) ACM, New York
-
Reid, J., Gonzalez Neito, J., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing Based Protocols. In: Bao, F., Miller, S. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security - ASIACCS 2007, Singapore, Republic of Singapore, pp. 204-213. ACM, New York (2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security - ASIACCS 2007, Singapore, Republic of Singapore
, pp. 204-213
-
-
Reid, J.1
Gonzalez Neito, J.2
Tang, T.3
Senadji, B.4
-
22
-
-
38149028509
-
Distance Bounding in Noisy Environments
-
Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
-
Singelée, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101-115. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
|