-
1
-
-
17644398259
-
Secure object identification - Or: Solving the chess grandmaster problem
-
Proceedings New Security Paradigms Workshop, NSPW 2003
-
A. Alkassar, C. Stuble, and A. Sadeghi Secure object identification: or solving the chess grandmaster problem Proceedings of new security paradigms workshop 2003 77 85 (Pubitemid 40557284)
-
(2004)
Proceedings New Security Paradigms Workshop
, pp. 77-85
-
-
Alkassar, A.1
Stable, C.2
Sadeghi, A.-R.3
-
8
-
-
0013398251
-
Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
-
Y. Desmedt Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them Proceedings of SecuriCom 88 1988 15 17
-
(1988)
Proceedings of SecuriCom 88
, pp. 15-17
-
-
Desmedt, Y.1
-
10
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
S. Drimer, and S.J. Murdoch Keep your enemies close: distance bounding against smartcard relay attacks Proceeding USENIX security symposium August 2007 87 102
-
(2007)
Proceeding USENIX Security Symposium
, pp. 87-102
-
-
Drimer, S.1
Murdoch, S.J.2
-
15
-
-
70349451691
-
Confidence in smart token proximity: Relay attacks revisited
-
Hancke GP, Mayes K, Markantonakis K. Confidence in smart token proximity: relay attacks revisited. Computers and Security 2009;28(7):61527
-
(2009)
Computers and Security
, vol.28
, Issue.7
, pp. 615-627
-
-
Hancke, G.P.1
Mayes, K.2
Markantonakis, K.3
-
17
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.C. Hu, A. Perrig, and D.B. Johnson Packet leashes: a defense against wormhole attacks in wireless networks Proceedings of INFOCOM April 2003 1976 1986
-
(2003)
Proceedings of INFOCOM
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
20
-
-
67049155493
-
The Swiss-knife RFID distance bounding protocol
-
C.H. Kim, G. Avoine, F. Koeune, F.X. Standaert, and O. Pereira The Swiss-knife RFID distance bounding protocol Proceedings of information security and cryptology December 2008 98 115
-
(2008)
Proceedings of Information Security and Cryptology
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
23
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void challenges and analysis in noisy channels
-
J. Munilla, and A. Peinado Distance bounding protocols for RFID enhanced by using void challenges and analysis in noisy channels Wireless Communications and Mobile Computing 8 2008 1227 1232
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
24
-
-
35248812563
-
Design of a digital baseband processor for UWB transceiver on RFID tag
-
DOI 10.1109/AINAW.2007.147, 4224130, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/ Symposia, AINAW'07
-
Y. Niu, M.B. Nejad, H. Tenhunen, and L.R. Zheng Design of a digital baseband processor for UWB transceiver on RFID tag Proceedings of advanced information networking and applications workshop May 2007 358 361 (Pubitemid 47565232)
-
(2007)
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
, vol.1
, pp. 358-361
-
-
Niu, Y.1
Nejad, M.B.2
Tenhunen, H.3
Zheng, L.-R.4
-
25
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, and S. Čapkun Secure neighborhood discovery: a fundamental element for mobile ad hoc networking IEEE Communications Magazine 46 2 2008 132 139
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.2
, pp. 132-139
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Čapkun, S.6
-
26
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
K.B. Rasmussen, and S. Čapkun Implications of radio fingerprinting on the security of sensor networks Proceedings of IEEE SecureComm 2007
-
(2007)
Proceedings of IEEE SecureComm
-
-
Rasmussen, K.B.1
Čapkun, S.2
-
27
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
DOI 10.1145/1229285.1229314, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
J. Reid, J.M.G. Nieto, T. Tang, and B. Senadji Detecting relay attacks with timing-based protocols Proceeding second ACM symposium on information computer and communications security March 2007 204 213 (Pubitemid 47479240)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
29
-
-
79952441218
-
Why legacy payment schemes are inadequate for mass transit
-
March . Cited 28 March 2010
-
Sheehan C. Why legacy payment schemes are inadequate for mass transit. Contactless News, March 2010. Cited 28 March 2010: 〈 http://www. contactlessnews.com/2010/03/23/why-legacy-payment-schemes-are-inadequate-for- mass-transit 〉.
-
(2010)
Contactless News
-
-
Sheehan, C.1
-
30
-
-
36249008630
-
Distance-bounding based defense against relay attacks in wireless networks
-
DOI 10.1109/TWC.2007.060183
-
C. Tang, and D.O. Wu Distance-bounding based defense against relay attacks in wireless networks IEEE Transactions on Wireless Communications 6 11 2007 4071 4078 (Pubitemid 350121756)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4071-4078
-
-
Tang, C.1
Wu, D.O.2
-
33
-
-
79952437916
-
-
Ubisense. White papers and datasheets, 2003-2006
-
Ubisense. White papers and datasheets, 20032006 〈 http://www.ubisense.net 〉.
-
-
-
|