-
1
-
-
84976295016
-
Distance Bounding Protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
3
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
Wiley Interscience, Hoboken
-
Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. In: Wireless Communications and Mobile Computing, vol. 8, pp. 1227-1232. Wiley Interscience, Hoboken (2008)
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
5
-
-
34748825630
-
Detecting Relay Attacks with Timing-Based Protocols
-
ACM, New York
-
Reid, J., Nieto, J.G., Tang, T., Senadji, B.: Detecting Relay Attacks with Timing-Based Protocols. In: Proc. of the 2nd ACM Symposium on Information, Computer, and Communications Security - ASIACCS 2007, pp. 204-213. ACM, New York (2007)
-
(2007)
Proc. of the 2nd ACM Symposium on Information, Computer, and Communications Security - ASIACCS 2007
, pp. 204-213
-
-
Reid, J.1
Nieto, J.G.2
Tang, T.3
Senadji, B.4
-
6
-
-
67049155493
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
7
-
-
79957663054
-
RFID Distance Bounding Protocols with Mixed Challenges
-
Kim, C.H., Avoine, G.: RFID Distance Bounding Protocols with Mixed Challenges. IEEE Trans. on Wireless Communications 10(5), 1618-1626 (2011)
-
(2011)
IEEE Trans. on Wireless Communications
, vol.10
, Issue.5
, pp. 1618-1626
-
-
Kim, C.H.1
Avoine, G.2
-
8
-
-
80051887821
-
How Secret-sharing can Defeat Terrorist Fraud
-
Avoine, G., Lauradoux, C., Marin, B.: How Secret-sharing can Defeat Terrorist Fraud. In: Proc. of the 4th ACM Conference on Wireless Network Security - WiSec 2011, pp. 145-156 (2011)
-
(2011)
Proc. of the 4th ACM Conference on Wireless Network Security - WiSec 2011
, pp. 145-156
-
-
Avoine, G.1
Lauradoux, C.2
Marin, B.3
-
10
-
-
84868335627
-
Distance Hijacking Attacks on Distance Bounding Protocols
-
IEEE Computer Society, Los Alamitos
-
Cremers, C., Rasmussen, K.B., Capkun, S.: Distance Hijacking Attacks on Distance Bounding Protocols. In: IEEE Symposium on Security and Privacy- S&P 2012, pp. 113-127. IEEE Computer Society, Los Alamitos (2012)
-
(2012)
IEEE Symposium on Security and Privacy- S&P 2012
, pp. 113-127
-
-
Cremers, C.1
Rasmussen, K.B.2
Capkun, S.3
-
11
-
-
18744409344
-
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy
-
ACM
-
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 8th ACM Conference on Computer and Communications Security -CCS 2003, pp. 103-111. ACM (2003)
-
(2003)
8th ACM Conference on Computer and Communications Security -CCS 2003
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
12
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: International Conference on Security in Pervasive Computing -SPC 2003, pp. 201-212 (2003)
-
(2003)
International Conference on Security in Pervasive Computing -SPC 2003
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|