-
2
-
-
84875683936
-
-
Smart Card Alliance, http://www.smartcardalliance.org, 2012.
-
(2012)
-
-
-
3
-
-
79952975500
-
A framework for analyzing RFID distance bounding protocols
-
G. Avoine, M. Bingol, S. Kardas, C. Lauradoux, and B. Martin, "A Framework for Analyzing RFID Distance Bounding Protocols," J. Computer Security, vol. 19, no. 2, pp. 289-317, 2010.
-
(2010)
J. Computer Security
, vol.19
, Issue.2
, pp. 289-317
-
-
Avoine, G.1
Bingol, M.2
Kardas, S.3
Lauradoux, C.4
Martin, B.5
-
4
-
-
0013402235
-
Secure implementation of identification systems
-
S. Bengio, G. Brassard, Y. Desmedt, C. Goutier, and J.-J. Quisquater, "Secure Implementation of Identification Systems," J. Cryptology, vol. 4, no. 3, pp. 175-183, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 175-183
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.3
Goutier, C.4
Quisquater, J.-J.5
-
8
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multi-Hop Wireless Networks," Proc. ACM Workshop Security Ad Hoc Sensor Networks (SASN), pp. 21-32, 2003.
-
(2003)
Proc. ACM Workshop Security Ad Hoc Sensor Networks (SASN)
, pp. 21-32
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
9
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
J. Clulow, G.P. Hancke, M.G. Kuhn, and T. Moore, "So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks," Proc. Third European Workshop Security and Privacy in Ad-Hoc and Sensor Networks (ESAS '06), pp. 83-97, 2006.
-
(2006)
Proc. Third European Workshop Security and Privacy in Ad-Hoc and Sensor Networks (ESAS '06)
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
10
-
-
0004232004
-
-
London Math. Soc. Monographs Academic Press
-
J.H. Conway, On Numbers and Games, vol. 6, London Math. Soc. Monographs. Academic Press, 1976.
-
(1976)
On Numbers and Games
, vol.6
-
-
Conway, J.H.1
-
11
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
Y. Desmedt, C. Goutier, and S. Bengio, "Special Uses and Abuses of the Fiat-Shamir Passport Protocol," Proc. Seventh Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '87), pp. 21-39, 1988.
-
(1988)
Proc. Seventh Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '87)
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
12
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
S. Drimer and S.J. Murdoch, "Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks," Proc. 16th USENIX Security Symp., pp. 1-16, 2007.
-
(2007)
Proc. 16th USENIX Security Symp
, pp. 1-16
-
-
Drimer, S.1
Murdoch, S.J.2
-
14
-
-
70349451691
-
Confidence in smart token priximity: Relay attacks revisited
-
G. Hancke, K. Mayes, and K. Markantonakis, "Confidence in Smart Token Priximity: Relay Attacks Revisited," Elsevier Computers and Security, vol. 28, no. 7, pp. 615-627, 2009.
-
(2009)
Elsevier Computers and Security
, vol.28
, Issue.7
, pp. 615-627
-
-
Hancke, G.1
Mayes, K.2
Markantonakis, K.3
-
15
-
-
63149186354
-
Distance bounding protocol for multiple RFID tag authentication
-
G. Kapoor, W. Zhou, and S. Piramuthu, "Distance Bounding Protocol for Multiple RFID Tag Authentication," Proc. IEEE/IFIP Int'l Conf. Embedded and Ubiquitous Computing (EUC '08), pp. 115-120, 2008.
-
(2008)
Proc. IEEE/IFIP Int'l Conf. Embedded and Ubiquitous Computing (EUC '08)
, pp. 115-120
-
-
Kapoor, G.1
Zhou, W.2
Piramuthu, S.3
-
17
-
-
79957663054
-
RFID distance bounding protocols with mixed challenges
-
May
-
C.H. Kim and G. Avoine, "RFID Distance Bounding Protocols with Mixed Challenges," IEEE Trans. Wireless Comm., vol. 10, no. 5, pp. 1618-1626, May 2011.
-
(2011)
IEEE Trans. Wireless Comm
, vol.10
, Issue.5
, pp. 1618-1626
-
-
Kim, C.H.1
Avoine, G.2
-
18
-
-
67049155493
-
The swiss-knife rfid distance bounding protocol
-
C.H. Kim, G. Avoine, F. Koeune, F.X. Standaert, and O. Pereira, "The Swiss-Knife RFID Distance Bounding Protocol," Proc. Int'l Conf. Information Security and Cryptology (ICISC '08), pp. 98-115, 2008.
-
(2008)
Proc. Int'l Conf. Information Security and Cryptology (ICISC '08)
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.X.4
Pereira, O.5
-
20
-
-
55349135872
-
Distance bounding protocols for rfid enhanced by using void-challenges and analysis in noisy channels
-
J. Munilla and A. Peinado, "Distance Bounding Protocols for RFID Enhanced by Using Void-Challenges and Analysis in Noisy Channels," Wireless Comm. and Mobile Computing, vol. 8, pp. 1227-1232, 2008.
-
(2008)
Wireless Comm. and Mobile Computing
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
24
-
-
79951677671
-
Distance bounding protocol for mutual authentication
-
Feb.
-
D.H. Yum, J.S. Kim, S.J. Hong, and P.J. Lee, "Distance Bounding Protocol for Mutual Authentication," IEEE Trans. Wireless Comm., vol. 10, no. 2, pp. 592-601, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Comm
, vol.10
, Issue.2
, pp. 592-601
-
-
Yum, D.H.1
Kim, J.S.2
Hong, S.J.3
Lee, P.J.4
|