-
1
-
-
80054814488
-
Security analysis of two distance-bounding protocols
-
Proceedings of RFlD Sec 2011 Springer
-
M. R. S. Abyneh. Security Analysis of two Distance-Bounding Protocols. In Proceedings of RFlDSec 2011. Lecture Notes in Computer Science. Springer, 2011.
-
(2011)
Lecture Notes in Computer Science
-
-
Abyneh, M.R.S.1
-
2
-
-
81055144596
-
A note on a privacy-preserving distance bounding protocol
-
LNCS Springer, Beijing, China, 23-26 November
-
J.-P. Aumasson, A. Mitrokotsa, and P. Peris-Lopez. A Note on a Privacy-preserving Distance Bounding Protocol. In Proceedings of the 13th International Corerence on lrormation and Communications Security (ICICS 2011), LNCS, pages 78-92. Springer, Beijing, China, 23-26 November.
-
Proceedings of the 13th International Corerence on Lrormation and Communications Security (ICICS 2011)
, pp. 78-92
-
-
Aumasson, J.-P.1
Mitrokotsa, A.2
Peris-Lopez, P.3
-
3
-
-
79952262142
-
A formal framework for analyzing RFID distance bounding protocols
-
2010
-
G. Avoine, M. A. Bingol, S. Karda, C. Lauradoux, and B. Martin. A Formal Framework for Analyzing RFID Distance Bounding Protocols. In fournal of Computer Security - Special Issue on RFID System Security, 2010, 2010.
-
(2010)
Fournal of Computer Security - Special Issue on RFID System Security
-
-
Avoine, G.1
Bingol, M.A.2
Karda, S.3
Lauradoux, C.4
Martin, B.5
-
4
-
-
84873148891
-
Optimal security limits of RFlD distance bounding protocols
-
G. Avoine, B. Martin, and T. Martin. Optimal Security Limits of RFlD Distance Bounding Protocols. In RFlDSec 2010, pages 220-238.
-
(2010)
RFlDSec
, pp. 220-238
-
-
Avoine, G.1
Martin, B.2
Martin, T.3
-
5
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
of Lecture Notes in Computer Science Springer-Verlag
-
G. Avoine and A. Tchamkerten. An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. In Information Security, volume 5735 of Lecture Notes in Computer Science, pages 250-261. Springer-Verlag, 2009.
-
(2009)
Information Security
, vol.5735
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
10
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
of Lecture Notes in Computer Science Springer-Verlag
-
J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. In Proceedings of the European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks, volume 4357 of Lecture Notes in Computer Science, pages 83-97. Springer-Verlag, 2006.
-
(2006)
Proceedings of the European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks
, vol.4357
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
12
-
-
0013398251
-
'Major security problems with the unforgeable' (Feige)-fiat-shamir proofs of identity and how to overcome them
-
SEDEP Paris, France
-
Y. Desmedt. 'Major Security Problems with the Unforgeable' (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome them. In SecuriCom, pages 15-17. SEDEP Paris, France, 1988.
-
(1988)
Securi Com
, pp. 15-17
-
-
Desmedt, Y.1
-
14
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Berkeley, CA, USA USENIX Association
-
S. Drimer and S. J. Murdoch. Keep your enemies close: distance bounding against smartcard relay attacks. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 7:1-7:16, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 71-716
-
-
Drimer, S.1
Murdoch, S.J.2
-
17
-
-
74549219772
-
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
-
K. Haataja and P. Toivanen. Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing and Countermeasures. Transactions on Wireless Communications, 9(1):384-392, 2010.
-
(2010)
Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 384-392
-
-
Haataja, K.1
Toivanen, P.2
-
19
-
-
33847329743
-
An RFlD distance bounding protocol
-
ACM Press
-
G. P. Hancke and M. G. Kuhn. An RFlD Distance Bounding Protocol. In SECURECOMM, pages 67-73. ACM Press, 2005.
-
(2005)
SECURECOMM
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
20
-
-
71549138804
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
of Lecture Notes in Computer Science Springer-Verlag
-
C. H. Kim and G. Avoine. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In Proceedings of the 8th International Corerence on Cryptology and Networks Security (CANS 2009), volume 5888 of Lecture Notes in Computer Science, pages 119-131. Springer-Verlag, 2009.
-
(2009)
Proceedings of the 8th International Corerence on Cryptology and Networks Security (CANS 2009)
, vol.5888
, pp. 119-131
-
-
Kim, C.H.1
Avoine, G.2
-
23
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
ACM Press
-
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji. Detecting Relay Attacks with Timing-Based Protocols. In ASIACCS, pages 204-213. ACM Press, 2007.
-
(2007)
ASIACCS
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
24
-
-
38149028509
-
Distance bounding in noisy environments
-
of Lecture Notes in Computer Science IEEE Computer Society Press
-
D. Singelee and B. Preneel. Distance Bounding in Noisy Environments. In European Workshop on Security in Ad-hoc and Sensor Networks -ESAS, volume 4572 of Lecture Notes in Computer Science, pages 101-115. IEEE Computer Society Press, 2007.
-
(2007)
European Workshop on Security in Ad-hoc and Sensor Networks -ESAS
, vol.4572
, pp. 101-115
-
-
Singelee, D.1
Preneel, B.2
-
26
-
-
78650079491
-
The poulidor distance-bounding protocol
-
R. Trujillo-Rasua, B. Martin, and G. Avoine. The Poulidor Distance-Bounding Protocol. In RFlDSec 2010, pages 239-257.
-
(2010)
RFlDSec
, pp. 239-257
-
-
Trujillo-Rasua, R.1
Martin, B.2
Avoine, G.3
|