메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 415-432

Design and implementation of a terrorist fraud resilient distance bounding system

Author keywords

Distance Bounding; Secure Ranging; Terrorist Fraud

Indexed keywords

ANALOG IMPLEMENTATION; ANALOG PROCESSING; DIGITAL IMPLEMENTATION; DISTANCE BOUND; DISTANCE BOUNDING; EFFICIENT IMPLEMENTATION; MAFIA FRAUD; ORDERS OF MAGNITUDE; RANGING SYSTEMS; TERRORIST FRAUD;

EID: 84865608549     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_24     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 1
    • 84865577390 scopus 로고    scopus 로고
    • Mini-Circuits, http://www.minicircuits.com
  • 3
    • 70350340297 scopus 로고    scopus 로고
    • Let's Get Physical: Models and Methods for Real-World Security Protocols
    • Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. Springer, Heidelberg
    • Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Let's Get Physical: Models and Methods for Real-World Security Protocols. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 1-22. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5674 , pp. 1-22
    • Basin, D.1    Capkun, S.2    Schaller, P.3    Schmidt, B.4
  • 4
    • 84976295016 scopus 로고
    • Distance Bounding Protocols
    • Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 8
    • 85028745474 scopus 로고
    • Special Uses and Abuses of the Fiat Shamir Passport Protocol
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Desmedt, Y., Goutier, C., Bengio, S.: Special Uses and Abuses of the Fiat Shamir Passport Protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 21-39
    • Desmedt, Y.1    Goutier, C.2    Bengio, S.3
  • 9
    • 75449102971 scopus 로고    scopus 로고
    • Location and Navigation Support for Emergency Responders: A Survey
    • Fischer, C., Gellersen, H.: Location and Navigation Support for Emergency Responders: A Survey. IEEE Pervasive Computing 9, 38-47 (2010)
    • (2010) IEEE Pervasive Computing , vol.9 , pp. 38-47
    • Fischer, C.1    Gellersen, H.2
  • 13
    • 79952438809 scopus 로고    scopus 로고
    • Design of a secure distance-bounding channel for RFID
    • Hancke, G.P.: Design of a secure distance-bounding channel for RFID. J. Netw. Comput. Appl. 34(3), 877-887 (2011)
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.3 , pp. 877-887
    • Hancke, G.P.1
  • 15
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: INFOCOM (2003)
    • (2003) INFOCOM
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 16
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2), 21-38 (2005)
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 17
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID Distance Bounding Protocol
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 27
    • 38149028509 scopus 로고    scopus 로고
    • Distance Bounding in Noisy Environments
    • Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
    • Singelée, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101-115. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4572 , pp. 101-115
    • Singelée, D.1    Preneel, B.2
  • 29
    • 70350366909 scopus 로고    scopus 로고
    • ID-Based Secure Distance Bounding and Localization
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Tippenhauer, N.O., Čapkun, S.: ID-Based Secure Distance Bounding and Localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 621-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 621-636
    • Tippenhauer, N.O.1    Čapkun, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.