-
1
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
Oct
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J. P. Hubaux, "Secure neighborhood discovery: A fundamental element for mobile ad hoc networking, " IEEE Commun. Mag., vol. 46, no. 10, pp. 132-139, Oct. 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.10
, pp. 132-139
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Capkun, S.6
Hubaux, J.P.7
-
2
-
-
79954495561
-
A standalone RFID indoor positioning system using passive tags
-
Jul.
-
S. S. Saad and Z. S. Nakadv, "A standalone RFID indoor positioning system using passive tags, " IEEE Trans. Ind. Electron., vol. 58, no. 5, pp. 1961-1970, Jul. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.58
, Issue.5
, pp. 1961-1970
-
-
Saad, S.S.1
Nakadv, Z.S.2
-
3
-
-
79955804626
-
Item-level RFID in a retail supply chain with stock-out-based substitution
-
May.
-
G. M. Gaukler, "Item-level RFID in a retail supply chain with stock-out-based substitution, " IEEE Trans. Ind. Inf., vol. 7, no. 2, pp. 362-370, May. 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.2
, pp. 362-370
-
-
Gaukler, G.M.1
-
4
-
-
52949100457
-
An efficient localization scheme for a differential-driving mobile robot based on RFID system
-
Nov
-
S. Han, H.-S. Lim, and J.-M. Lee, "An efficient localization scheme for a differential-driving mobile robot based on RFID system, " IEEE Trans. Ind. Electron., vol. 54, no. 6, pp. 3362-3369, Nov. 2007.
-
(2007)
IEEE Trans. Ind. Electron
, vol.54
, Issue.6
, pp. 3362-3369
-
-
Han, S.1
Lim, H.-S.2
Lee, J.-M.3
-
5
-
-
59049098426
-
Credential management for automatic identification solutions in supply chain management
-
Nov
-
M. Henseler, M. Rossberg, and G. Schaefer, "Credential management for automatic identification solutions in supply chain management, " IEEE Trans. Ind. Inf., vol. 4, no. 4, pp. 303-314, Nov. 2008.
-
(2008)
IEEE Trans. Ind. Inf
, vol.4
, Issue.4
, pp. 303-314
-
-
Henseler, M.1
Rossberg, M.2
Schaefer, G.3
-
6
-
-
67651171672
-
RFID-Based smart freezer
-
A. Soylemezoglu, M. J. Zawodniok, and S. Jagannathan, "RFID-Based smart freezer, " IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2347-2356, 2009.
-
(2009)
IEEE Trans. Ind. Electron
, vol.56
, Issue.7
, pp. 2347-2356
-
-
Soylemezoglu, A.1
Zawodniok, M.J.2
Jagannathan, S.3
-
7
-
-
67651177970
-
Autonomousmobile robot navigation using passive RFID in indoor environment
-
S. Park and S. Hashimoto, "Autonomousmobile robot navigation using passive RFID in indoor environment, " IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2366-2373, 2009.
-
(2009)
IEEE Trans. Ind. Electron
, vol.56
, Issue.7
, pp. 2366-2373
-
-
Park, S.1
Hashimoto, S.2
-
8
-
-
70349451691
-
Confidence in smart token proximity: Relay attacks revisited
-
G. P. Hancke, K. E. Mayes, and K. Markantonakis, "Confidence in smart token proximity: Relay attacks revisited, "Comput. Security, vol. 28, pp. 615-627, 2009.
-
(2009)
Comput. Security
, vol.28
, pp. 615-627
-
-
Hancke, G.P.1
Mayes, K.E.2
Markantonakis, K.3
-
9
-
-
77951198358
-
A node-to-node location verification method
-
May
-
D. Lui, M.-C. Lee, and D. Wu, "A node-to-node location verification method, " IEEE Trans. Ind. Electron., vol. 57, no. 5, pp. 1526-1537, May 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.5
, pp. 1526-1537
-
-
Lui, D.1
Lee, M.-C.2
Wu, D.3
-
10
-
-
84976295016
-
Distance-bounding protocols
-
T. Helleseth, Ed. Berlin, Germany: Springer
-
S. Brands and D. Chaum, "Distance-bounding protocols, " in Advances in Cryptology-EUROCRYPT '93, T. Helleseth, Ed. Berlin, Germany: Springer, 1994, pp. 344-359.
-
(1994)
Advances in Cryptology-EUROCRYPT '93
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
11
-
-
33847329743
-
An RFID distance bounding protocol
-
Athens, Greece
-
G. P. Hancke and M. G. Kuhn, "An RFID distance bounding protocol, " in Proc. 1st Int. Conf. Security Privacy for Emerging Areas inCommun., Athens, Greece, 2005, pp. 67-73.
-
(2005)
Proc. 1st Int. Conf. Security Privacy for Emerging Areas InCommun.
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
12
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
J. Munilla and A. Peinado, "Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels, " WirelessCommun. MobileComputing, vol. 8, pp. 1227-1232, 2008.
-
(2008)
WirelessCommun. MobileComputing
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
13
-
-
36249008630
-
Distance-bounding based defense against relay attacks in wireless networks
-
DOI 10.1109/TWC.2007.060183
-
C. Tang, D. O. Wu, T. Syst, and L. Oswego, "Distance-bounding based defense against relay attacks in wireless networks, " IEEE Trans. WirelessCommun., vol. 6, no. 11, pp. 4071-4078, Nov. 2007. (Pubitemid 350121756)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4071-4078
-
-
Tang, C.1
Wu, D.O.2
-
14
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
San Diego, CA
-
L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks, " in Proc. 11th Network Distrib. Syst. Security Symp., San Diego, CA, 2004, pp. 131-141.
-
(2004)
Proc. 11th Network Distrib. Syst. Security Symp.
, pp. 131-141
-
-
Hu, L.1
Evans, D.2
-
15
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
DOI 10.1109/IPSN.2005.1440903, 1440903, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks, " in Proc. 4th IEEE In. Symp. Inf. Process. Sensor Networks, Los Angeles, CA, 2005, pp. 91-98. (Pubitemid 43841219)
-
(2005)
2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
, vol.2005
, pp. 91-98
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
16
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
DOI 10.1109/INFCOM.2007.21, 4215603, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
R. Maheshwari, J. Gao, and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information, " in Proc. 26th IEEE Int. Conf.Comput.Commun., Anchorage, AL, 2007, pp. 107-115. (Pubitemid 47334221)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
17
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
Nice, France
-
K. B. Rasmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks, " in Proc. 3rd IEEE Int. Conf. Security PrivacyCommun. Networks, Nice, France, 2007, pp. 331-340.
-
(2007)
Proc. 3rd IEEE Int. Conf. Security PrivacyCommun. Networks
, pp. 331-340
-
-
Rasmussen, K.B.1
Capkun, S.2
-
18
-
-
42649116160
-
Secure localization algorithms for wireless sensor networks
-
DOI 10.1109/MCOM.2008.4481347
-
A. Boukerche, H. Oliveira, E. F. Nakamura, and A. A. Loureiro, "Secure localization algorithms for wireless sensor networks, " IEEE Commun. Mag., vol. 46, pp. 96-101, 2008. (Pubitemid 351593414)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 96-101
-
-
Boukerche, A.1
Oliveira, H.A.B.F.2
Nakamura, E.F.3
Loureiro, A.A.F.4
-
19
-
-
33144454801
-
Secure positioning inwireless networks
-
Feb
-
S. Capkun and J. P. Hubaux, "Secure positioning inwireless networks, " IEEE J. Sel. AreasCommun., vol. 24, no. 2, pp. 221-232, Feb. 2006.
-
(2006)
IEEE J. Sel. AreasCommun
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.P.2
-
20
-
-
79952975500
-
A framework for analyzing RFID distance bounding protocols
-
Apr.
-
G. Avoine, M. A. Bingol, S. Kardas, C. Lauradoux, and B. Martin, "A framework for analyzing RFID distance bounding protocols, " J.Comput. Security, vol. 19, no. 2, pp. 289-317, Apr. 2011.
-
(2011)
J. Comput. Security
, vol.19
, Issue.2
, pp. 289-317
-
-
Avoine, G.1
Bingol, M.A.2
Kardas, S.3
Lauradoux, C.4
Martin, B.5
-
21
-
-
68349138859
-
-
Ph. D. dissertation,Comput. Lab., Univ. of Cambridge, Cambridge, U. K Feb [Online]
-
G. P. Hancke, "Security of proximity identification systems" Ph. D. dissertation,Comput. Lab., Univ. of Cambridge, Cambridge, U. K., Feb. 2008 [Online]. Available: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-752.pdf
-
(2008)
Security of Proximity Identification Systems
-
-
Hancke, G.P.1
-
22
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
C. Pomerance, Ed. Berlin, Germany: Springer
-
Y. Desmedt, C. Goutier, and S. Bengio, "Special uses and abuses of the fiat-shamir passport protocol, " in Advances in Cryptology-CRYPTO '87, C. Pomerance, Ed. Berlin, Germany: Springer, 1988, pp. 21-39.
-
(1988)
Advances in Cryptology-CRYPTO '87
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
23
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA
-
Y. C. Hu, A. Perrig, andD. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols, " in Pro. 2ndACMWorkshop Wireless Security, San Diego, CA, 2003, pp. 30-40.
-
(2003)
Pro. 2nd ACM Workshop Wireless Security
, pp. 30-40
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
24
-
-
0345964587
-
Major security problems with the "unforgeable" (feige)-Fiat-Shamir proofs of identity and how to overcome them
-
Y. Desmedt, "Major security problems with the " unforgeable" (feige)-Fiat-Shamir proofs of identity and how to overcome them, " in Proc. 6th Worldwide CongressComput.Commun. Security Protection, 1988, pp. 147-159.
-
(1988)
Proc. 6th Worldwide CongressComput.Commun. Security Protection
, pp. 147-159
-
-
Desmedt, Y.1
-
25
-
-
84885078444
-
Distance-bounding proof of knowledge to avoid real-time attacks
-
R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura, Eds. Berlin, Germany: Springer
-
L. Bussard and W. Bagga, "Distance-bounding proof of knowledge to avoid real-time attacks, " in Security and Privacy in the Age of UbiquitousComputing, R. Sasaki, S. Qing, E. Okamoto, and H. Yoshiura, Eds. Berlin, Germany: Springer, 2005, pp. 223-238.
-
(2005)
Security and Privacy in the Age of UbiquitousComputing
, pp. 223-238
-
-
Bussard, L.1
Bagga, W.2
-
26
-
-
0035424017
-
Location systems for ubiquitouscomputing
-
J. Hightower and G. Borriello, "Location systems for ubiquitouscomputing, " IEEE Computer, vol. 34, pp. 57-66, 2001.
-
(2001)
IEEE Computer
, vol.34
, pp. 57-66
-
-
Hightower, J.1
Borriello, G.2
-
27
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
L. Buttyan, V. Gligor, and D. Westhoff, Eds. Berlin, Germany: Springer
-
J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore, "So near and yet so far: Distance-bounding attacks in wireless networks, " in Security and Privacy in Ad-Hoc and Sensor Networks, L. Buttyan, V. Gligor, and D. Westhoff, Eds. Berlin, Germany: Springer, 2006, pp. 83-97.
-
(2006)
Security and Privacy in Ad-Hoc and Sensor Networks
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
29
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
DOI 10.1145/1229285.1229314, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji, "Detecting relay attacks with timing-based protocols, " in Proc. 2nd ACM Symp. Inf.,Comput.Commun. Security, Singapore, 2007, pp. 204-213. (Pubitemid 47479240)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
31
-
-
71549138804
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
J. A. Garay, A. Miyaji, and A. Otsuka, Eds. Berlin, Germany: Springer
-
C. H. Kim and G. Avoine, "RFID distance bounding protocol with mixed challenges to prevent relay attacks, " in Cryptology and Network Security-CANS '09, J. A. Garay, A. Miyaji, and A. Otsuka, Eds. Berlin, Germany: Springer, 2009, pp. 119-133.
-
(2009)
Cryptology and Network Security-CANS '09
, pp. 119-133
-
-
Kim, C.H.1
Avoine, G.2
-
32
-
-
67049155493
-
The swiss-knife RFID distance bounding protocol
-
P. J. Lee and J. H. Cheon, Eds. Berlin, Germany: Springer
-
C. H. Kim, G. Avoine, F. Koeune, F. X. Standaert, and O. Pereira, "The swiss-knife RFID distance bounding protocol, " in Information Security and Cryptology-ICISC 2008, P. J. Lee and J. H. Cheon, Eds. Berlin, Germany: Springer, 2009, pp. 98-115.
-
(2009)
Information Security and Cryptology-ICISC 2008
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
33
-
-
79952441513
-
Towards more efficient distance bounding protocols for use in sensor networks
-
Baltimore MD
-
C. Meadows, P. Syverson, and L. W. Chang, "Towards more efficient distance bounding protocols for use in sensor networks, " in Proc. 2nd Int. Conf. Security PrivacyCommun. Networks, Baltimore, MD, 2006, pp. 1-5.
-
(2006)
Proc. 2nd Int. Conf. Security PrivacyCommun. Networks
, pp. 1-5
-
-
Meadows, C.1
Syverson, P.2
Chang, L.W.3
-
34
-
-
77649240515
-
RFID distance bounding multistate enhancement
-
B. Roy and N. Sendrier, Eds. Berlin, Germany: Springer
-
G. Avoine, C. Floerkemeier, and B. Martin, "RFID distance bounding multistate enhancement, " in Progress in Cryptology-INDOCRYPT '09, B. Roy and N. Sendrier, Eds. Berlin, Germany: Springer, 2009, pp. 290-307.
-
(2009)
Progress in Cryptology-INDOCRYPT '09
, pp. 290-307
-
-
Avoine, G.1
Floerkemeier, C.2
Martin, B.3
-
35
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
P. Samarati M. Yung, F. Martinelli, and C. A. Ardagna, Eds. Berlin, Germany: Springer
-
G. Avoine and A. Tchamkerten, "An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement, " in Information Security, P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, Eds. Berlin, Germany: Springer, 2009, pp. 250-261.
-
(2009)
Information Security
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
36
-
-
77953906142
-
-
Jun 20 [Online]
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, and J. C. A. van der Lubbe, "Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks, " Jun. 20, 2010. [Online]. Available: http://arxiv.org/PS-cache/arxiv/pdf/0906/0906. 4618v2.pdf
-
(2010)
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Van Der Lubbe, J.C.A.4
-
37
-
-
77956599919
-
Security in building automation systems
-
Nov.
-
W. Granzer, F. Praus, andW. Kastner, "Security in building automation systems, " IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2011.
-
(2011)
IEEE Trans. Ind. Electron
, vol.57
, Issue.11
, pp. 3622-3630
-
-
Granzer, W.1
Praus, F.2
Kastner, W.3
-
38
-
-
79951577827
-
Formal vulnerability analysis of a security system for remote fieldbus access
-
Feb.
-
M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access, " IEEE Trans. Ind. Inf., vol. 7, no. 1, pp. 30-40, Feb. 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.1
, pp. 30-40
-
-
Cheminod, M.1
Pironti, A.2
Sisto, R.3
-
39
-
-
77955712393
-
On maximizing reliability of real-time embedded applications under hard energy constraint
-
Aug.
-
B. Zhao, H. Aydin, and D. Zhu, "On maximizing reliability of real-time embedded applications under hard energy constraint, " IEEE Trans. Ind. Inf., vol. 6, no. 3, pp. 316-328, Aug. 2010.
-
(2010)
IEEE Trans. Ind. Inf
, vol.6
, Issue.3
, pp. 316-328
-
-
Zhao, B.1
Aydin, H.2
Zhu, D.3
-
40
-
-
79956290240
-
A loss inference algorithm for wireless sensor networks to improve data reliability of digital ecosystems
-
Jun.
-
Y. Yang, Y. Xu, X. Li, and C. Chen, "A loss inference algorithm for wireless sensor networks to improve data reliability of digital ecosystems, " IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2126-2137, Jun. 2011.
-
(2011)
IEEE Trans. Ind. Electron
, vol.58
, Issue.6
, pp. 2126-2137
-
-
Yang, Y.1
Xu, Y.2
Li, X.3
Chen, C.4
-
41
-
-
78149469554
-
Parameter selection for real-time controllers in resource-constrained systems
-
Nov.
-
Y. Wu, G. Buttazzo, E. Bini, and A. Cervin, "Parameter selection for real-time controllers in resource-constrained systems, " IEEE Trans. Ind. Inf., vol. 6, no. 4, pp. 610-620, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Inf
, vol.6
, Issue.4
, pp. 610-620
-
-
Wu, Y.1
Buttazzo, G.2
Bini, E.3
Cervin, A.4
-
42
-
-
77951156895
-
Hardware implementation of RFID mutual authentication protocol
-
May
-
Y.-J. Huang, C.-C. Yuan, M.-K. Chen, W.-C. Lin, and H.-C. Teng, "Hardware implementation of RFID mutual authentication protocol, " IEEE Trans. Ind. Electron., vol. 57, no. 5, pp. 1573-1582, May 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.5
, pp. 1573-1582
-
-
Huang, Y.-J.1
Yuan, C.-C.2
Chen, M.-K.3
Lin, W.-C.4
Teng, H.-C.5
-
43
-
-
77955709887
-
Comparative study of energy-efficient sampling approaches for wireless control networks
-
Aug.
-
J. Ploennigs, V. Vasyutynskyy, and K. Kabitzsch, "Comparative study of energy-efficient sampling approaches for wireless control networks, " IEEE Trans. Ind. Inf., vol. 6, no. 3, pp. 416-424, Aug. 2010.
-
(2010)
IEEE Trans. Ind. Inf
, vol.6
, Issue.3
, pp. 416-424
-
-
Ploennigs, J.1
Vasyutynskyy, V.2
Kabitzsch, K.3
-
44
-
-
80051780804
-
Energy-efficient coverage of wireless sensor networks using ant colony optimization with three types of pheromones
-
Aug.
-
J.-W. Lee, B.-S. Choi, and J.-J. Lee, "Energy-efficient coverage of wireless sensor networks using ant colony optimization with three types of pheromones, " IEEE Trans. Ind. Inf., vol. 7, no. 3, pp. 419-427, Aug. 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.3
, pp. 419-427
-
-
Lee, J.-W.1
Choi, B.-S.2
Lee, J.-J.3
-
45
-
-
81255144115
-
Performance of a real-time EtherCAT master under Linux
-
Nov.
-
M. Cereia, I. Cibrario-Bertolotti, and S. Scanzio, "Performance of a real-time EtherCAT master under Linux, " IEEE Trans. Ind. Inf., vol. 7, no. 4, pp. 679-687, Nov. 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.4
, pp. 679-687
-
-
Cereia, M.1
Cibrario-Bertolotti, I.2
Scanzio, S.3
-
46
-
-
77955667024
-
Energy-efficient task synchronization for real-time systems
-
Aug.
-
Y.-S. Chen, C.-Y. Yang, and T.-W. Kuo, "Energy-efficient task synchronization for real-time systems, " IEEE Trans. Ind. Inf., vol. 6, no. 3, pp. 287-301, Aug. 2010.
-
(2010)
IEEE Trans. Ind. Inf
, vol.6
, Issue.3
, pp. 287-301
-
-
Chen, Y.-S.1
Yang, C.-Y.2
Kuo, T.-W.3
-
47
-
-
84871821380
-
Recommendation for the transitioning of cryptographic algorithms and key sizes
-
[Online]
-
E. Barker and A. Roginsky, "Recommendation for the transitioning of cryptographic algorithms and key sizes, " CiteSeerx. USA, Jan. 2010. [Online]. Available: http://csrc. nist. gov/publications/drafts/800-131/draft- 800-131-transition-paper.pdf
-
(2010)
CiteSeerx. USA, Jan
-
-
Barker, E.1
Roginsky, A.2
-
48
-
-
56749181480
-
Attacks on time-of-flight distance bounding channels
-
Alexandria, VA
-
G. P. Hancke and M. G. Kuhn, "Attacks on time-of-flight distance bounding channels, " in Proc. 1st ACM Conf. Wireless Network Security, Alexandria, VA, 2008, pp. 194-202.
-
(2008)
Proc. 1st ACM Conf. Wireless Network Security
, pp. 194-202
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
49
-
-
38149028509
-
Distance bounding in noisy environments
-
F. Stajano C. Meadows, S. Capkun, and T. Moore, Eds. Berlin, Germany: Springer
-
D. Singelée and B. Preneel, "Distance bounding in noisy environments, " in Security and Privacy in Ad-Hoc and Sensor Networks, F. Stajano, C. Meadows, S. Capkun, and T. Moore, Eds. Berlin, Germany: Springer, 2007, pp. 101-115.
-
(2007)
Security and Privacy in Ad-Hoc and Sensor Networks
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
50
-
-
76549120985
-
Attacks on a distance bounding protocol
-
J. Munilla and A. Peinado, "Attacks on a distance bounding protocol, "ComputerCommun., vol. 33, pp. 884-889, 2010.
-
(2010)
ComputerCommun
, vol.33
, pp. 884-889
-
-
Munilla, J.1
Peinado, A.2
-
51
-
-
79951826348
-
RFID and contactless technology
-
Eds. Berlin, Germany: Springer
-
G. P. Hancke, "RFID and Contactless Technology, " in Smart Cards, Tokens, Security and Applications, Mayes and Markantonakis, Eds. Berlin, Germany: Springer, 2008.
-
(2008)
Smart Cards, Tokens, Security and Applications, Mayes and Markantonakis
-
-
Hancke, G.P.1
-
52
-
-
77955855632
-
Designing a random number generator with novel parallel LFSR substructure for key stream ciphers
-
Jun
-
Z. Moghadam, I. Rostami, A. S. Tanhatalab, andM. R. Ferdowsi, "Designing a random number generator with novel parallel LFSR substructure for key stream ciphers, " in Proc. Int. Conf.Comput. Design Applic., Jun. 2010, pp. 598-601.
-
(2010)
Proc. Int. Conf.Comput. Design Applic.
, pp. 598-601
-
-
Moghadam, Z.1
Rostami, I.2
Tanhatalab, A.S.3
Ferdowsi, M.R.4
-
53
-
-
79952438809
-
Design of a secure distance-bounding channel for RFID
-
G. P. Hancke, "Design of a secure distance-bounding channel for RFID, " J. NetworkComput. Applic., vol. 34, pp. 877-887, 2011.
-
(2011)
J. NetworkComput. Applic
, vol.34
, pp. 877-887
-
-
Hancke, G.P.1
-
54
-
-
85066944987
-
Keep your enemies close: Distance bounding against Smartcard relay attacks
-
Boston, MA
-
S. Drimer and S. J. Murdoch, "Keep your enemies close: Distance bounding against Smartcard relay attacks, " in Proc. 16th USENIX Security Symp., Boston, MA, 2007, pp. 87-102.
-
(2007)
Proc. 16th USENIX Security Symp
, pp. 87-102
-
-
Drimer, S.1
Murdoch, S.J.2
-
56
-
-
77952350344
-
Effectiveness of distance-decreasing attacks against impulse radio ranging
-
Hoboken, NJ
-
M. Flury, M. Poturalski, P. Papadimitratos, J. P. Hubaux, and J. Y. Le Boudec, "Effectiveness of distance-decreasing attacks against impulse radio ranging, " in Proc. 3rd ACM Conf. Wireless Network Security, Hoboken, NJ, 2010, pp. 117-128.
-
(2010)
Proc. 3rd ACM Conf. Wireless Network Security
, pp. 117-128
-
-
Flury, M.1
Poturalski, M.2
Papadimitratos, P.3
Hubaux, J.P.4
Le Boudec, J.Y.5
-
57
-
-
79953104627
-
Real-time location systems for hospital emergency response
-
April
-
I. D'Souza, M. Wei, and C. Notobartolo, "Real-time location systems for hospital emergency response, " IEEE IT Professional, vol. 13, no. 2, pp. 37-43, April 2011.
-
(2011)
IEEE IT Professional
, vol.13
, Issue.2
, pp. 37-43
-
-
D'Souza, I.1
Wei, M.2
Notobartolo, C.3
-
58
-
-
70450252080
-
Attacks on public WLAN-based positioning systems
-
Jun
-
N. O. Tippenhauer, K. B. Rasmussen, C. Pöpper, and S. Capkun, "Attacks on public WLAN-based positioning systems, " in Proc. ACM/Usenix Conf. Mobile Syst., Applic. and Services (MobiSys), Jun. 2009, pp. 29-40.
-
(2009)
Proc. ACM/Usenix Conf. Mobile Syst., Applic. and Services (MobiSys)
, pp. 29-40
-
-
Tippenhauer, N.O.1
Rasmussen, K.B.2
Pöpper, C.3
Capkun, S.4
-
60
-
-
84888152161
-
Practical relay attack on contactless transactions by using NFC mobile phones
-
Nov
-
L. Francis, G. P. Hancke, K. E. Mayes, and K. Markantonakis, "Practical relay attack on contactless transactions by using NFC mobile phones, " Cryptology ePrint Archive, Report 2011/618, Nov. 2011.
-
(2011)
Cryptology EPrint Archive, Report 2011/618
-
-
Francis, L.1
Hancke, G.P.2
Mayes, K.E.3
Markantonakis, K.4
-
61
-
-
78549255905
-
Application of RFID and RTLS technology in supply chain enterprise
-
Sep
-
Y. Zang and L. Wu, "Application of RFID and RTLS technology in supply chain enterprise, " in Proc. WirelessCommun. Networking MobileComputing, Sep. 2010, pp. 1-4.
-
(2010)
Proc. WirelessCommun. Networking MobileComputing
, pp. 1-4
-
-
Zang, Y.1
Wu, L.2
-
62
-
-
79955480673
-
Distance bounding with IEEE 802. 15. 4a: Attacks and countermeasures
-
Apr.
-
M. Poturalski, M. Flury, P. Papadimitratos, J.-P. Hubaux, and J.-Y. Le Boudec, "Distance bounding with IEEE 802. 15. 4a: Attacks and countermeasures, " IEEE Trans. WirelessCommun., vol. 10, no. 4, pp. 1334-1344, Apr. 2011.
-
(2011)
IEEE Trans. WirelessCommun
, vol.10
, Issue.4
, pp. 1334-1344
-
-
Poturalski, M.1
Flury, M.2
Papadimitratos, P.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
64
-
-
78651449553
-
UWB impulse radio based distance bounding
-
M. Kuhn, H. Luecken, and N. O. Tippenhauer, "UWB impulse radio based distance bounding, " in Proc. Workshop Positioning, NavigationCommun., 2010.
-
(2010)
Proc. Workshop Positioning, NavigationCommun
-
-
Kuhn, M.1
Luecken, H.2
Tippenhauer, N.O.3
-
65
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
S. Apkun, L. Buttyán, and J. P. Hubaux, "SECTOR: Secure tracking of node encounters in multi-hop wireless networks, " in Proc. 1st ACM Workshop Security of Ad-Hoc and Sensor Network, Fairfax, VA, 2003, pp. 21-32.
-
(2003)
Proc. 1st ACM Workshop Security of Ad-Hoc and Sensor Network, Fairfax, VA
, pp. 21-32
-
-
Apkun, S.1
Buttyán, L.2
Hubaux, J.P.3
-
66
-
-
79952958289
-
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
-
January
-
G. P. Hancke, "Practical eavesdropping and skimming attacks on high-frequency RFID tokens, " J.Comput. Security, vol. 19, no. 2, pp. 259-288, January 2011.
-
(2011)
J.Comput. Security
, vol.19
, Issue.2
, pp. 259-288
-
-
Hancke, G.P.1
-
67
-
-
84877308436
-
An efficient distributed localization algorithm for wireless sensor networks: Based on smart reference-selection method
-
A. M. Abu-Mahfouz and G. P. Hancke, "An efficient distributed localization algorithm for wireless sensor networks: Based on smart reference-selection method, " Intersci. J. Sensor Networks, 2012.
-
(2012)
Intersci. J. Sensor Networks
-
-
Abu-Mahfouz, A.M.1
Hancke, G.P.2
-
68
-
-
80051781496
-
Inertial sensor-based indoor pedestrian localization with minimum 802. 15. 4a configuration
-
Aug.
-
S. Lee, B. Kim, H. Kim, R. Ha, and H. Cha, "Inertial sensor-based indoor pedestrian localization with minimum 802. 15. 4a configuration, " IEEE Trans. Ind. Inf., vol. 7, no. 3, pp. 455-466, Aug. 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.3
, pp. 455-466
-
-
Lee, S.1
Kim, B.2
Kim, H.3
Ha, R.4
Cha, H.5
-
69
-
-
84871743184
-
Localization-based radio model calibration for fault-tolerant wireless mesh networks
-
S. Ivanov and E. Nett, "Localization-based radio model calibration for fault-tolerant wireless mesh networks, " IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012.
-
(2012)
IEEE Trans. Ind. Inf.
, vol.PP
, Issue.99
-
-
Ivanov, S.1
Nett, E.2
-
70
-
-
84864549429
-
Server independent authentication scheme for RFID systems
-
B. Wang and M. MaAn, "Server independent authentication scheme for RFID systems, " IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012.
-
(2012)
IEEE Trans. Ind. Inf.
, vol.PP
, Issue.99
-
-
Wang, B.1
Maan, M.2
-
71
-
-
0013433454
-
Identification tokens-or: Solving the chess grandmaster problem
-
Aug
-
T. Beth and Y. Desmedt, "Identification tokens-or: Solving the chess grandmaster problem, " in Proc. Adv. Cryptol., Aug. 1990, pp. 169-177.
-
(1990)
Proc. Adv. Cryptol
, pp. 169-177
-
-
Beth, T.1
Desmedt, Y.2
|