-
1
-
-
80051887821
-
How Secret-sharing can Defeat Terrorist Fraud
-
ACM, ACM Press June
-
Avoine, G., Lauradoux, C., Martin, B.: How Secret-sharing can Defeat Terrorist Fraud. In: Proceedings of the 4th ACM Conference on Wireless Network Security - WiSec 2011, Hamburg, Germany. ACM, ACM Press (June 2011)
-
(2011)
Proceedings of the 4th ACM Conference on Wireless Network Security - WiSec 2011, Hamburg, Germany
-
-
Avoine, G.1
Lauradoux, C.2
Martin, B.3
-
2
-
-
70350424442
-
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Avoine, G., Tchamkerten, A.: An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
3
-
-
84976295016
-
Distance Bounding Protocols
-
Extended Abstract Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance Bounding Protocols (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
4
-
-
79959462113
-
Distance hijacking attacks on distance bounding protocols
-
ePrint Archive, Report 2011/129
-
Cremers, C., Rasmussen, K.B., Čapkun, S.: Distance hijacking attacks on distance bounding protocols. Cryptology ePrint Archive, Report 2011/129 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Cremers, C.1
Rasmussen, K.B.2
Čapkun, S.3
-
6
-
-
80054817974
-
A Formal Approach to Distance-Bounding RFID Protocols
-
Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. Springer, Heidelberg
-
Dürholz, U., Fischlin, M., Kasper, M., Onete, C.: A Formal Approach to Distance-Bounding RFID Protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 47-62. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7001
, pp. 47-62
-
-
Dürholz, U.1
Fischlin, M.2
Kasper, M.3
Onete, C.4
-
7
-
-
84866028865
-
Provably secure distance-bounding: An analysis of prominent protocols
-
ePrint Archive, Report 2012/128
-
Fischlin, M., Onete, C.: Provably secure distance-bounding: an analysis of prominent protocols. Cryptology ePrint Archive, Report 2012/128 (2012)
-
(2012)
Cryptology
-
-
Fischlin, M.1
Onete, C.2
-
10
-
-
63149186354
-
Distance Bounding Protocol for Multiple RFID Tag Authentication
-
IEEE, IEEE Computer Society, Shanghai, China
-
Kapoor, G., Zhou, W., Piramuthu, S.: Distance Bounding Protocol for Multiple RFID Tag Authentication. In: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, vol. 02, pp. 115-120. IEEE, IEEE Computer Society, Shanghai, China (2008)
-
(2008)
Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008
, vol.2
, pp. 115-120
-
-
Kapoor, G.1
Zhou, W.2
Piramuthu, S.3
-
11
-
-
71549138804
-
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
12
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
13
-
-
84937429269
-
A Threshold Pseudorandom Function Construction and Its Applications
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Nielsen, J.B.: A Threshold Pseudorandom Function Construction and Its Applications. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 401-416. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 401-416
-
-
Nielsen, J.B.1
-
14
-
-
34748825630
-
Detecting Relay Attacks with Timing-based Protocols
-
ACM, Singapore March
-
Reid, J., Gonzalez Nieto, J.M., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-based Protocols. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, pp. 204-213. ACM, Singapore (March 2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007
, pp. 204-213
-
-
Reid, J.1
Gonzalez Nieto, J.M.2
Tang, T.3
Senadji, B.4
|