-
1
-
-
79952262142
-
A Framework for Analyzing RFID Distance Bounding Protocols
-
G. Avoine, M. A. Bingöl, S. Kardaş, C. Lauradoux, and B. Martin. A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security - Special Issue on RFID System Security, 2010.
-
(2010)
Journal of Computer Security - Special Issue on RFID System Security
-
-
Avoine, G.1
Bingöl, M.A.2
Kardaş, S.3
Lauradoux, C.4
Martin, B.5
-
3
-
-
70350340297
-
Let's get physical: Models and methods for real-world security protocols
-
Springer
-
D. Basin, S. Čapkun, P. Schaller, and B. Schmidt. Let's get physical: Models and methods for real-world security protocols. In Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics, TPHOLs '09, pages 1-22. Springer, 2009.
-
(2009)
Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics, TPHOLs '09
, pp. 1-22
-
-
Basin, D.1
Čapkun, S.2
Schaller, P.3
Schmidt, B.4
-
4
-
-
84976295016
-
Distance-bounding protocols
-
Advances in Cryptology - EUROCRYPT '93, Springer
-
S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology - EUROCRYPT '93, volume 765 of LNCS, pages 344-359. Springer, 1994.
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
84885078444
-
Distance-bounding proof of knowledge to avoid real-time attacks
-
Security and Privacy in the Age of Ubiquitous Computing, Springer Boston
-
L. Bussard and W. Bagga. Distance-bounding proof of knowledge to avoid real-time attacks. In Security and Privacy in the Age of Ubiquitous Computing, volume 181 of IFIP Advances in Information and Communication Technology, pages 223-238. Springer Boston, 2005.
-
(2005)
IFIP Advances in Information and Communication Technology
, vol.181
, pp. 223-238
-
-
Bussard, L.1
Bagga, W.2
-
6
-
-
70349088576
-
Secure and precise location verification using distance bounding and simultaneous multilateration
-
ACM
-
J. T. Chiang, J. J. Haas, and Y.-C. Hu. Secure and precise location verification using distance bounding and simultaneous multilateration. In Proceedings of the second ACM conference on Wireless network security, WiSec '09, pages 181-192. ACM, 2009.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security, WiSec '09
, pp. 181-192
-
-
Chiang, J.T.1
Haas, J.J.2
Hu, Y.-C.3
-
7
-
-
33750936222
-
Feasibility of multi-protocol attacks
-
Vienna, Austria, April IEEE Computer Society
-
C. Cremers. Feasibility of multi-protocol attacks. In Proc. of The First International Conference on Availability, Reliability and Security (ARES), pages 287-294, Vienna, Austria, April 2006. IEEE Computer Society.
-
(2006)
Proc. of the First International Conference on Availability, Reliability and Security (ARES)
, pp. 287-294
-
-
Cremers, C.1
-
10
-
-
80054817974
-
A formal approach to distance-bounding RFID protocols
-
Information Security Conference (ISC) 2011, To appear
-
U. Duerholz, M. Fischlin, M. Kasper, and C. Onete. A formal approach to distance-bounding RFID protocols. In Information Security Conference (ISC) 2011, LNCS, 2011. To appear.
-
(2011)
LNCS
-
-
Duerholz, U.1
Fischlin, M.2
Kasper, M.3
Onete, C.4
-
13
-
-
84956985093
-
Protocol interactions and the chosen protocol attack
-
Proc. 5th International Workshop on Security Protocols, Springer
-
J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In Proc. 5th International Workshop on Security Protocols, volume 1361 of LNCS, pages 91-104. Springer, 1997.
-
(1997)
LNCS
, vol.1361
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
14
-
-
67049155493
-
The Swiss-Knife RFID distance bounding protocol
-
Information Security and Cryptology ICISC 2008, Springer
-
C. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The Swiss-Knife RFID distance bounding protocol. In Information Security and Cryptology ICISC 2008, volume 5461 of Lecture Notes in Computer Science, pages 98-115. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5461
, pp. 98-115
-
-
Kim, C.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
18
-
-
84882715141
-
Distance bounding protocols: Authentication logic analysis and collusion attacks
-
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer US
-
C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, pages 279-298. Springer US, 2007.
-
(2007)
Advances in Information Security
, vol.30
, pp. 279-298
-
-
Meadows, C.1
Poovendran, R.2
Pavlovic, D.3
Chang, L.4
Syverson, P.5
-
19
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
November
-
J. Munilla and A. Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 8:1227-1232, November 2008.
-
(2008)
Wirel. Commun. Mob. Comput.
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
21
-
-
77953892886
-
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
-
P. Peris-Lopez, J. Hernandez-Castro, J. Tapiador, E. Palomar, and J. van der Lubbe. Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security. In RFID, 2010 IEEE International Conference on, pages 45-52, 2010.
-
(2010)
RFID, 2010 IEEE International Conference on
, pp. 45-52
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Tapiador, J.3
Palomar, E.4
Van Der Lubbe, J.5
-
22
-
-
80053005536
-
Investigation of signal and message manipulations on the wireless channel
-
ESORICS 2011 - 16th European Symposium on Research in Computer Security. Proceedings, Springer
-
C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Čapkun. Investigation of signal and message manipulations on the wireless channel. In ESORICS 2011 - 16th European Symposium on Research in Computer Security. Proceedings, volume 6879 of LNCS, pages 40-59. Springer, 2011.
-
(2011)
LNCS
, vol.6879
, pp. 40-59
-
-
Pöpper, C.1
Tippenhauer, N.O.2
Danev, B.3
Čapkun, S.4
-
24
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
ACM
-
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji. Detecting relay attacks with timing-based protocols. In Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS '07, pages 204-213. ACM, 2007.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
25
-
-
85175133310
-
Automatic analysis of distance bounding protocols
-
Foundations of Computer Security. Affiliated to
-
B. B. S. Malladi and K. Kothapalli. Automatic analysis of distance bounding protocols. In Foundations of Computer Security. Affiliated to LICS09, August 2009. Informal proceedings.
-
LICS09, August 2009. Informal Proceedings
-
-
Malladi, B.B.S.1
Kothapalli, K.2
-
28
-
-
78650079491
-
The Poulidor distance-bounding protocol
-
Springer
-
R. Trujillo-Rasua, B. Martin, and G. Avoine. The Poulidor distance-bounding protocol. In Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, RFIDSec'10, pages 239-257. Springer, 2010.
-
(2010)
Proceedings of the 6th International Conference on Radio Frequency Identification: Security and Privacy Issues, RFIDSec'10
, pp. 239-257
-
-
Trujillo-Rasua, R.1
Martin, B.2
Avoine, G.3
-
29
-
-
4544259841
-
SECTOR: secure tracking of node encounters in multi-hop wireless networks
-
ACM
-
S. Čapkun, L. Buttyán, and J.-P. Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, SASN '03, pages 21-32. ACM, 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN '03
, pp. 21-32
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
30
-
-
34247391971
-
Integrity regions: Authentication through presence in wireless networks
-
ACM
-
S. Čapkun and M. Čagalj. Integrity regions: authentication through presence in wireless networks. In ACM workshop on Wireless security, pages 1-10. ACM, 2006.
-
(2006)
ACM Workshop on Wireless Security
, pp. 1-10
-
-
Čapkun, S.1
Čagalj, M.2
|