-
1
-
-
79952262142
-
Framework for analyzing RFID distance bounding protocols
-
G. Avoine, M. Bingol, S. Kardas, C. Lauradoux, and B. Martin, "Framework for analyzing RFID distance bounding protocols," J. Comput. Security, special issue on RFID syst. security, 2010.
-
(2010)
J. Comput. Security, Special Issue on RFID Syst. Security
-
-
Avoine, G.1
Bingol, M.2
Kardas, S.3
Lauradoux, C.4
Martin, B.5
-
2
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
Springer
-
G. Avoine and A. Tchamkerten, "An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement," in Proc. 12th Inf. Security Conf. 2009, vol. 5735 of Lecture Notes Comput. Science, pp. 250-261. Springer, 2009.
-
(2009)
Proc. 12th Inf. Security Conf. 2009 5735 of Lecture Notes Comput. Science
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
3
-
-
0013402235
-
Secure implementation of identification systems
-
S. Bengio, G. Brassard, Y. Desmedt, C. Goutier, and J.-J. Quisquater, "Secure implementation of identification systems," J. Cryptology, vol. 4, no. 3, pp. 175-183, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 175-183
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.3
Goutier, C.4
Quisquater, J.-J.5
-
5
-
-
84885078444
-
Distance-bounding proof of knowledge to avoid real-time attacks
-
Springer- Verlag
-
L. Bussard and W. Bagga, "Distance-bounding proof of knowledge to avoid real-time attacks," IFIP International Federation for Information Processing, vol. 181, pp. 223-238. Springer-Verlag, 2005.
-
(2005)
IFIP International Federation for Information Processing
, vol.181
, pp. 223-238
-
-
Bussard, L.1
Bagga, W.2
-
6
-
-
35048883388
-
Embedding distance-bounding protocols within intuitive interactions
-
of Lecture Notes in Computer Science, Springer-Verlag
-
L. Bussard and Y. Roudier, "Embedding distance-bounding protocols within intuitive interactions," Security in Pervasive Computing - SPC, vol. 2802 of Lecture Notes in Computer Science, pp. 119-142. Springer- Verlag, 2003.
-
(2003)
Security in Pervasive Computing - SPC
, vol.2802
, pp. 119-142
-
-
Bussard, L.1
Roudier, Y.2
-
7
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. INFOCOM, pp. 1917-1928.
-
Proc. INFOCOM
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.-P.2
-
8
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
Lecture Notes in Computer Science, Springer
-
J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore, "So near and yet so far: distance-bounding attacks in wireless networks," in Proc. Third European Workshop Security and Privacy in Ad-Hoc and Sensor Networks 2006, vol. 4357, Lecture Notes in Computer Science, pp. 83-97. Springer, 2006.
-
(2006)
Proc. Third European Workshop Security and Privacy in Ad-Hoc and Sensor Networks 2006
, vol.4357
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
9
-
-
0013398251
-
Major security problems with the "unforgeable" (Feige)- Fiat-Shamir proofs of identiy and how to overcome them
-
Y. Desmedt, "Major security problems with the " Unforgeable" (Feige)- Fiat-Shamir proofs of identiy and how to overcome them," in Proc. SecuriCom '88, pp. 15-17.
-
Proc. SecuriCom
, vol.88
, pp. 15-17
-
-
Desmedt, Y.1
-
10
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
of Lecture Notes in Computer Science, Springer
-
Y. Desmedt, C. Goutier, and S. Bengio, "Special uses and abuses of the Fiat-Shamir passport protocol," in Proc. Adv. Cryptology - CRYPTO '87, 7th Annual International Cryptology Conf., vol. 293 of Lecture Notes in Computer Science, pp. 21-39. Springer, 1988.
-
(1988)
Proc. Adv. Cryptology - CRYPTO '87, 7th Annual International Cryptology Conf.
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
11
-
-
85066944987
-
Keep your enemies close: Distance bounding against smarcard relay attacks
-
S. Drimer and S. J. Murdoch, "Keep your enemies close: distance bounding against smarcard relay attacks," in Proc. 16th USENIX Security Sympositum, pp. 1-16, 2007.
-
(2007)
Proc. 16th USENIX Security Sympositum
, pp. 1-16
-
-
Drimer, S.1
Murdoch, S.J.2
-
13
-
-
63149186354
-
Distance bounding protocol for multiple RFID tag authentication
-
G. Kapoor, W. Zhou, and S. Piramuthu, "Distance bounding protocol for multiple RFID tag authentication," in Proc. IEEE/IFIP International Conf. Embedded Ubiquitous Comput., pp. 115-120, 2008.
-
(2008)
Proc. IEEE/IFIP International Conf. Embedded Ubiquitous Comput.
, pp. 115-120
-
-
Kapoor, G.1
Zhou, W.2
Piramuthu, S.3
-
14
-
-
71549138804
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
of Lecture Notes in Computer Science
-
C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks," in Proc. 8th International Conference on Cryptology and Network Security 2009, vol. 5888 of Lecture Notes in Computer Science, pp. 119-133. Springer, 2009.
-
(2009)
Proc. 8th International Conference on Cryptology and Network Security 2009
, vol.5888
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
16
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
Published online: Jan 17 2008; an extended abstract appears in [15]
-
J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels," Wireless Commun. Mobile Comput., 2008. Published online: Jan 17 2008; an extended abstract appears in [15].
-
(2008)
Wireless Commun. Mobile Comput.
-
-
Munilla, J.1
Peinado, A.2
-
17
-
-
38149028509
-
Distance bounding in noisy environments
-
of Lecture Notes in Computer Science, Springer
-
D. Singelée and B. Preneel, "Distance bounding in noisy environments," in Proc. Security and Privacy in Ad-hoc and Sensor Networks 2007, vol. 4572 of Lecture Notes in Computer Science, pp. 101-115. Springer, 2007.
-
(2007)
Proc. Security and Privacy in Ad-hoc and Sensor Networks 2007
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
|