메뉴 건너뛰기




Volumn , Issue , 2012, Pages 74-79

Mafia fraud attack against the RČ Distance-Bounding Protocol

Author keywords

[No Author keywords available]

Indexed keywords

DISTANCE BOUNDING; LOCATION PRIVACY; MAFIA FRAUD; MAN IN THE MIDDLES (MITM); NEW PROTOCOL; PROBABILITY OF SUCCESS; SIMULTANEOUS TRANSMISSION; UPPER BOUND;

EID: 84873109622     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID-TA.2012.6404571     Document Type: Conference Paper
Times cited : (22)

References (26)
  • 1
    • 80054814488 scopus 로고    scopus 로고
    • Security analysis of two distance-bounding protocols
    • Proceedings of RFlD Sec 2011 Springer
    • M. R. S. Abyneh. Security Analysis of two Distance-Bounding Protocols. In Proceedings of RFlDSec 2011. Lecture Notes in Computer Science. Springer, 2011.
    • (2011) Lecture Notes in Computer Science
    • Abyneh, M.R.S.1
  • 4
    • 84873148891 scopus 로고    scopus 로고
    • Optimal security limits of RFlD distance bounding protocols
    • G. Avoine, B. Martin, and T. Martin. Optimal Security Limits of RFlD Distance Bounding Protocols. In RFlDSec 2010, pages 220-238.
    • (2010) RFlDSec , pp. 220-238
    • Avoine, G.1    Martin, B.2    Martin, T.3
  • 5
    • 70350424442 scopus 로고    scopus 로고
    • An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
    • of Lecture Notes in Computer Science Springer-Verlag
    • G. Avoine and A. Tchamkerten. An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. In Information Security, volume 5735 of Lecture Notes in Computer Science, pages 250-261. Springer-Verlag, 2009.
    • (2009) Information Security , vol.5735 , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 12
    • 0013398251 scopus 로고
    • 'Major security problems with the unforgeable' (Feige)-fiat-shamir proofs of identity and how to overcome them
    • SEDEP Paris, France
    • Y. Desmedt. 'Major Security Problems with the Unforgeable' (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome them. In SecuriCom, pages 15-17. SEDEP Paris, France, 1988.
    • (1988) Securi Com , pp. 15-17
    • Desmedt, Y.1
  • 14
  • 17
    • 74549219772 scopus 로고    scopus 로고
    • Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
    • K. Haataja and P. Toivanen. Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing and Countermeasures. Transactions on Wireless Communications, 9(1):384-392, 2010.
    • (2010) Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 384-392
    • Haataja, K.1    Toivanen, P.2
  • 19
    • 33847329743 scopus 로고    scopus 로고
    • An RFlD distance bounding protocol
    • ACM Press
    • G. P. Hancke and M. G. Kuhn. An RFlD Distance Bounding Protocol. In SECURECOMM, pages 67-73. ACM Press, 2005.
    • (2005) SECURECOMM , pp. 67-73
    • Hancke, G.P.1    Kuhn, M.G.2
  • 20
    • 71549138804 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent relay attacks
    • of Lecture Notes in Computer Science Springer-Verlag
    • C. H. Kim and G. Avoine. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In Proceedings of the 8th International Corerence on Cryptology and Networks Security (CANS 2009), volume 5888 of Lecture Notes in Computer Science, pages 119-131. Springer-Verlag, 2009.
    • (2009) Proceedings of the 8th International Corerence on Cryptology and Networks Security (CANS 2009) , vol.5888 , pp. 119-131
    • Kim, C.H.1    Avoine, G.2
  • 23
    • 34748825630 scopus 로고    scopus 로고
    • Detecting relay attacks with timing-based protocols
    • ACM Press
    • J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji. Detecting Relay Attacks with Timing-Based Protocols. In ASIACCS, pages 204-213. ACM Press, 2007.
    • (2007) ASIACCS , pp. 204-213
    • Reid, J.1    Nieto, J.M.G.2    Tang, T.3    Senadji, B.4
  • 24
    • 38149028509 scopus 로고    scopus 로고
    • Distance bounding in noisy environments
    • of Lecture Notes in Computer Science IEEE Computer Society Press
    • D. Singelee and B. Preneel. Distance Bounding in Noisy Environments. In European Workshop on Security in Ad-hoc and Sensor Networks -ESAS, volume 4572 of Lecture Notes in Computer Science, pages 101-115. IEEE Computer Society Press, 2007.
    • (2007) European Workshop on Security in Ad-hoc and Sensor Networks -ESAS , vol.4572 , pp. 101-115
    • Singelee, D.1    Preneel, B.2
  • 26
    • 78650079491 scopus 로고    scopus 로고
    • The poulidor distance-bounding protocol
    • R. Trujillo-Rasua, B. Martin, and G. Avoine. The Poulidor Distance-Bounding Protocol. In RFlDSec 2010, pages 239-257.
    • (2010) RFlDSec , pp. 239-257
    • Trujillo-Rasua, R.1    Martin, B.2    Avoine, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.