메뉴 건너뛰기




Volumn , Issue , 2011, Pages 145-155

How secret-sharing can defeat terrorist fraud

Author keywords

Authentication; Distance bounding; Mafia fraud; Secret sharing; Terrorist fraud; Threshold cryptography

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; TERRORISM;

EID: 80051887821     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998412.1998437     Document Type: Conference Paper
Times cited : (35)

References (38)
  • 6
    • 85062838317 scopus 로고    scopus 로고
    • Safeguarding cryptographic keys
    • Arlington, NY, USA, 1979-317
    • G. R. Blakley. Safeguarding cryptographic keys. In AFIPS 1979 National Computer Conference, volume 48, pages 313-317, Arlington, NY, USA, 1979-317.
    • AFIPS 1979 National Computer Conference , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 7
    • 79952978359 scopus 로고    scopus 로고
    • Looking on the bright side of black-box cryptography
    • Security Protocols
    • M. Blaze. Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). In Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, pages 54-61, Cambridge, UK, April 2000. Springer-Verlag. (Pubitemid 33347507)
    • (2001) Lecture Notes in Computer Science , Issue.2133 , pp. 54-61
    • Blaze, M.1
  • 9
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. Brickell and D. M. Davenport. On the classification of ideal secret sharing schemes. Journal of Cryptology, 4:123-134, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 14
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • Santa Clara, CA, USA, June USENIX Association
    • S. Drimer and S. J. Murdoch. Keep your enemies close: distance bounding against smartcard relay attacks. In 16th USENIX Security Symposium on USENIX Security Symposium, pages 1-16, Santa Clara, CA, USA, June 2007. USENIX Association.
    • (2007) 16th USENIX Security Symposium on USENIX Security Symposium , pp. 1-16
    • Drimer, S.1    Murdoch, S.J.2
  • 18
  • 20
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions. Application to cascaded constructions
    • Santa Barbara, CA, USA, August Springer-Verlag
    • A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 306-316, Santa Barbara, CA, USA, August 2004. Springer-Verlag.
    • (2004) Advances in Cryptology - CRYPTO 2004, Volume 3152 of Lecture Notes in Computer Science , pp. 306-316
    • Joux, A.1
  • 25
    • 0019608784 scopus 로고
    • On sharing secrets and reed-solomon codes
    • R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Communication of the ACM, 24(9):583-584, 1981.
    • (1981) Communication of the ACM , vol.24 , Issue.9 , pp. 583-584
    • Mceliece, R.J.1    Sarwate, D.V.2
  • 27
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • J. Munilla and A. Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing, 8(9):1227-1232, 2008.
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.9 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 29
    • 85076297394 scopus 로고    scopus 로고
    • Realization of RF distance bounding
    • Washington, DC, USA, August
    • K. B. Rasmussen and S. Čapkun. Realization of RF Distance Bounding. In USENIX Security Symposium, Washington, DC, USA, August 2010.
    • (2010) USENIX Security Symposium
    • Rasmussen, K.B.1    Čapkun, S.2
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.