-
3
-
-
84976295016
-
Distance-bounding protocols
-
Proc. EUROCRYPT'93, ser.
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Proc. EUROCRYPT'93, ser. LNCS, vol. 765, 1994, pp. 344-359.
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
4
-
-
84885078444
-
Distance-bounding proof of knowledge to avoid real-time attacks
-
Springer Boston
-
L. Bussard and W. Bagga, "Distance-bounding proof of knowledge to avoid real-time attacks," in Security and Privacy in the Age of Ubiquitous Computing, vol. 181. Springer Boston, 2005, pp. 223-238.
-
(2005)
Security and Privacy in the Age of Ubiquitous Computing
, vol.181
, pp. 223-238
-
-
Bussard, L.1
Bagga, W.2
-
5
-
-
38149028509
-
Distance bounding in noisy environments
-
Security and Privacy in Ad-hoc and Sensor Networks - ESAS 2007, ser. Springer
-
D. Singelée and B. Preneel, "Distance bounding in noisy environments,"in Security and Privacy in Ad-hoc and Sensor Networks - ESAS 2007, ser. LNCS, vol. 4572. Springer, 2007, pp. 101-115.
-
(2007)
LNCS
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
6
-
-
70350366909
-
ID-Based Secure Distance Bounding and Localization
-
Computer Security - ESORICS 2009, ser. Springer Berlin / Heidelberg
-
N. O. Tippenhauer and S. Čapkun, "ID-Based Secure Distance Bounding and Localization," in Computer Security - ESORICS 2009, ser. LNCS, vol. 5789. Springer Berlin / Heidelberg, 2010, pp. 621-636.
-
(2010)
LNCS
, vol.5789
, pp. 621-636
-
-
Tippenhauer, N.O.1
Čapkun, S.2
-
7
-
-
77953906142
-
-
arXiv:0906.4618v2
-
P. Peris-Lopez, J. C. Hernandez-Castro, C. Dimitrakakis, A. Mitrokotsa, and J. M. E. Tapiador, "Shedding light on RFID distance bounding protocols and terrorist fraud attacks," arXiv:0906.4618v2, 2010.
-
(2010)
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Dimitrakakis, C.3
Mitrokotsa, A.4
Tapiador, J.M.E.5
-
8
-
-
76749095501
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
ePrint Archive, Report 2009/310
-
C. Kim and G. Avoine. (2009) RFID distance bounding protocol with mixed challenges to prevent relay attacks. Cryptology ePrint Archive, Report 2009/310.
-
(2009)
Cryptology
-
-
Kim, C.1
Avoine, G.2
-
10
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
ACM
-
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji, "Detecting relay attacks with timing-based protocols," in Proc. ASIACCS'07. ACM, 2007, pp. 204-213.
-
(2007)
Proc. ASIACCS'07
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
11
-
-
70349940333
-
The Swiss-knife RFID distance bounding protocol
-
Proceedings of ICISC '08, ser. Springer-Verlag, Dec.
-
C. Kim, G. Avoine, F. Koeune, F. X. Standaert, and O. Pereira, "The Swiss-knife RFID distance bounding protocol," in Proceedings of ICISC '08, ser. LNCS. Springer-Verlag, Dec. 2008.
-
(2008)
LNCS
-
-
Kim, C.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
12
-
-
84855199141
-
-
arXiv, Tech. Rep. 1009.0278
-
C. Dimitrakakis, A. Mitrokotsa, and S. Vaudenay, "Expected loss analysis of thresholded authentication protocols in noisy conditions, "arXiv, Tech. Rep. 1009.0278, 2011.
-
(2011)
Expected Loss Analysis of Thresholded Authentication Protocols in Noisy Conditions
-
-
Dimitrakakis, C.1
Mitrokotsa, A.2
Vaudenay, S.3
-
13
-
-
0013398251
-
Major security problems with the "unforgeable" (Feige)-Fiat-Shamir proofs of identity and how to overcome them
-
Y. Desmedt, "Major security problems with the " unforgeable" (Feige)-Fiat-Shamir proofs of identity and how to overcome them," in Proc. SecuriCom '88, Mar. 1988, pp. 147-159.
-
Proc. SecuriCom '88, Mar. 1988
, pp. 147-159
-
-
Desmedt, Y.1
-
14
-
-
84936749991
-
Distinguishing distributions using Chernoff information
-
Springer-Verlag
-
T. Baignères, P. Sepehrdad, and S. Vaudenay, "Distinguishing distributions using Chernoff information," in ProvSec 2010. Springer-Verlag, 2010.
-
(2010)
ProvSec 2010
-
-
Baigneres, T.1
Sepehrdad, P.2
Vaudenay, S.3
-
16
-
-
0001549344
-
Sequential design of experiments
-
H. Chernoff, "Sequential design of experiments," Annals of Mathematical Statistics, vol. 30, no. 3, pp. 755-770, 1959.
-
(1959)
Annals of Mathematical Statistics
, vol.30
, Issue.3
, pp. 755-770
-
-
Chernoff, H.1
-
17
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
-, "A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations," Annals of Mathematical Statistics, vol. 23, no. 4, pp. 493-507, 1952.
-
(1952)
Annals of Mathematical Statistics
, vol.23
, Issue.4
, pp. 493-507
-
-
Chernoff, H.1
-
18
-
-
0031334110
-
Does parallel repetition lower the error in computationally sound protocols?
-
Published by the IEEE Computer Society
-
M. Bellare, R. Impagliazzo, and M. Naor, "Does parallel repetition lower the error in computationally sound protocols?" in focs. Published by the IEEE Computer Society, 1997, p. 374.
-
(1997)
Focs
, pp. 374
-
-
Bellare, M.1
Impagliazzo, R.2
Naor, M.3
-
19
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
October
-
S. Čapkun, L. Buttyán, and J. Hubaux, "Sector: Secure tracking of node encounters in multi-hop wireless networks," in ACM SASN, October 2003, pp. 21-32.
-
(2003)
ACM SASN
, pp. 21-32
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.3
-
22
-
-
61349140043
-
Authentication over noisy channels
-
February
-
L. Lai, H. E. Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 906-916, February 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.2
, pp. 906-916
-
-
Lai, L.1
Gamal, H.E.2
Poor, H.V.3
-
23
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
March
-
W. Hoeffding, "Probability inequalities for sums of bounded random variables," Journal of the American Statistical Association, vol. 58, no. 301, pp. 13-30, March 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
|