-
1
-
-
84865577390
-
-
Mini-Circuits, http://www.minicircuits.com
-
-
-
-
2
-
-
79952975500
-
A framework for analyzing RFID distance bounding protocols
-
Avoine, G., Bingöl, M.A., Kardaş, S., Lauradoux, C., Martin, B.: A framework for analyzing RFID distance bounding protocols. J. Comput. Secur. 19(2), 289-317 (2011)
-
(2011)
J. Comput. Secur.
, vol.19
, Issue.2
, pp. 289-317
-
-
Avoine, G.1
Bingöl, M.A.2
Kardaş, S.3
Lauradoux, C.4
Martin, B.5
-
3
-
-
70350340297
-
Let's Get Physical: Models and Methods for Real-World Security Protocols
-
Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. Springer, Heidelberg
-
Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Let's Get Physical: Models and Methods for Real-World Security Protocols. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 1-22. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5674
, pp. 1-22
-
-
Basin, D.1
Capkun, S.2
Schaller, P.3
Schmidt, B.4
-
4
-
-
84976295016
-
Distance Bounding Protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
6
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
ACM October
-
Capkun, S., Buttyn, L., Hubaux, J.P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 21-32. ACM (October 2003)
-
(2003)
Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 21-32
-
-
Capkun, S.1
Buttyn, L.2
Hubaux, J.P.3
-
7
-
-
84868335627
-
Distance Hijacking Attacks on Distance Bounding Protocols
-
Cremers, C., Rasmussen, K.B., Schmidt, B., Capkun, S.: Distance Hijacking Attacks on Distance Bounding Protocols. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (May 2012)
-
Proceedings of the 33rd IEEE Symposium on Security and Privacy (May 2012)
-
-
Cremers, C.1
Rasmussen, K.B.2
Schmidt, B.3
Capkun, S.4
-
8
-
-
85028745474
-
Special Uses and Abuses of the Fiat Shamir Passport Protocol
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y., Goutier, C., Bengio, S.: Special Uses and Abuses of the Fiat Shamir Passport Protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
9
-
-
75449102971
-
Location and Navigation Support for Emergency Responders: A Survey
-
Fischer, C., Gellersen, H.: Location and Navigation Support for Emergency Responders: A Survey. IEEE Pervasive Computing 9, 38-47 (2010)
-
(2010)
IEEE Pervasive Computing
, vol.9
, pp. 38-47
-
-
Fischer, C.1
Gellersen, H.2
-
11
-
-
84860689367
-
On the security issues of NFC enabled mobile phones
-
December
-
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: On the security issues of NFC enabled mobile phones. International Journal of Internet Technology and Secured Transactions 2 (December 2010)
-
(2010)
International Journal of Internet Technology and Secured Transactions
, vol.2
-
-
Francis, L.1
Hancke, G.2
Mayes, K.3
Markantonakis, K.4
-
12
-
-
33750318741
-
Proximity Based Access Control in Smart-Emergency Departments
-
March
-
Gupta, S.K.S., Mukherjee, T., Venkatasubramanian, K., Taylor, T.B.: Proximity Based Access Control in Smart-Emergency Departments. In: Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 512-516 (March 2006)
-
(2006)
Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 512-516
-
-
Gupta, S.K.S.1
Mukherjee, T.2
Venkatasubramanian, K.3
Taylor, T.B.4
-
13
-
-
79952438809
-
Design of a secure distance-bounding channel for RFID
-
Hancke, G.P.: Design of a secure distance-bounding channel for RFID. J. Netw. Comput. Appl. 34(3), 877-887 (2011)
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.3
, pp. 877-887
-
-
Hancke, G.P.1
-
15
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: INFOCOM (2003)
-
(2003)
INFOCOM
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
17444426121
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2), 21-38 (2005)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
18
-
-
78651449553
-
UWB Impulse Radio Based Distance Bounding
-
March
-
Kuhn, M., Luecken, H., Tippenhauer, N.O.: UWB Impulse Radio Based Distance Bounding. In: Proceedings of the 7th Workshop on Positioning, Navigation and Communication, pp. 28-37 (March 2010)
-
(2010)
Proceedings of the 7th Workshop on Positioning, Navigation and Communication
, pp. 28-37
-
-
Kuhn, M.1
Luecken, H.2
Tippenhauer, N.O.3
-
19
-
-
36248934122
-
Survey of Wireless Indoor Positioning Techniques and Systems
-
Liu, H., Darabi, H., Banerjee, P., Liu, J.: Survey of Wireless Indoor Positioning Techniques and Systems. IEEE Transactions on Systems, Man, and Cybernetics 37(6), 1067-1080 (2007)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.37
, Issue.6
, pp. 1067-1080
-
-
Liu, H.1
Darabi, H.2
Banerjee, P.3
Liu, J.4
-
20
-
-
38149113034
-
Distance bounding protocols with void-challenges for RFID
-
Printed handout at the
-
Munilla, J., Ortiz, A., Peinado, A.: Distance bounding protocols with void-challenges for RFID. Printed handout at theWorkshop on RFID Security, RFIDSec (2006)
-
Workshop on RFID Security, RFIDSec (2006)
-
-
Munilla, J.1
Ortiz, A.2
Peinado, A.3
-
21
-
-
84865577380
-
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
-
abs/0906.4618
-
Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., van der Lubbe, J.C.A.: Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009)
-
(2009)
CoRR
-
-
Peris-Lopez, P.1
Castro, J.C.H.2
Estévez-Tapiador, J.M.3
Van Der Lubbe, J.C.A.4
-
22
-
-
77953892886
-
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
-
April
-
Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Palomar, E., van der Lubbe, J.C.A.: Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security. In: IEEE International Conference on RFID, pp. 45-52 (April 2010)
-
(2010)
IEEE International Conference on RFID
, pp. 45-52
-
-
Peris-Lopez, P.1
Castro, J.C.H.2
Estévez-Tapiador, J.M.3
Palomar, E.4
Van Der Lubbe, J.C.A.5
-
23
-
-
79955480673
-
Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures
-
Poturalski, M., Flury, M., Papadimitratos, P., Hubaux, J.P., Boudec, J.Y.L.: Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures. IEEE Transactions on Wireless Communications 10(4), 1334-1344 (2011)
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.4
, pp. 1334-1344
-
-
Poturalski, M.1
Flury, M.2
Papadimitratos, P.3
Hubaux, J.P.4
Boudec, J.Y.L.5
-
24
-
-
74049128234
-
Proximity-based Access Control for Implantable Medical Devices
-
ACM November
-
Rasmussen, K.B., Castelluccia, C., Heydt-Benjamin, T.S., Čapkun, S.: Proximity-based Access Control for Implantable Medical Devices. In: Proceedings of the 16th ACM conference on Computer and Communications Security, pp. 410-419. ACM (November 2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Čapkun, S.4
-
26
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
March
-
Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 204-213 (March 2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
27
-
-
38149028509
-
Distance Bounding in Noisy Environments
-
Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
-
Singelée, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101-115. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
29
-
-
70350366909
-
ID-Based Secure Distance Bounding and Localization
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Tippenhauer, N.O., Čapkun, S.: ID-Based Secure Distance Bounding and Localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 621-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 621-636
-
-
Tippenhauer, N.O.1
Čapkun, S.2
|