메뉴 건너뛰기




Volumn 12, Issue 5, 2013, Pages 830-839

Mutual distance bounding protocols

Author keywords

authentication; distance bounding protocol; relay attack; RFID

Indexed keywords

DISTANCE BOUNDING PROTOCOLS; FALSE ACCEPTANCE RATE; MUTUAL AUTHENTICATION; MUTUAL DISTANCES; PASSIVE RFID TAGS; RELAY ATTACK; SECURITY MARGINS; WIRELESS ENVIRONMENT;

EID: 84875653078     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.47     Document Type: Article
Times cited : (20)

References (24)
  • 2
    • 84875683936 scopus 로고    scopus 로고
    • Smart Card Alliance, http://www.smartcardalliance.org, 2012.
    • (2012)
  • 3
    • 79952975500 scopus 로고    scopus 로고
    • A framework for analyzing RFID distance bounding protocols
    • G. Avoine, M. Bingol, S. Kardas, C. Lauradoux, and B. Martin, "A Framework for Analyzing RFID Distance Bounding Protocols," J. Computer Security, vol. 19, no. 2, pp. 289-317, 2010.
    • (2010) J. Computer Security , vol.19 , Issue.2 , pp. 289-317
    • Avoine, G.1    Bingol, M.2    Kardas, S.3    Lauradoux, C.4    Martin, B.5
  • 10
    • 0004232004 scopus 로고
    • London Math. Soc. Monographs Academic Press
    • J.H. Conway, On Numbers and Games, vol. 6, London Math. Soc. Monographs. Academic Press, 1976.
    • (1976) On Numbers and Games , vol.6
    • Conway, J.H.1
  • 12
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • S. Drimer and S.J. Murdoch, "Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks," Proc. 16th USENIX Security Symp., pp. 1-16, 2007.
    • (2007) Proc. 16th USENIX Security Symp , pp. 1-16
    • Drimer, S.1    Murdoch, S.J.2
  • 14
    • 70349451691 scopus 로고    scopus 로고
    • Confidence in smart token priximity: Relay attacks revisited
    • G. Hancke, K. Mayes, and K. Markantonakis, "Confidence in Smart Token Priximity: Relay Attacks Revisited," Elsevier Computers and Security, vol. 28, no. 7, pp. 615-627, 2009.
    • (2009) Elsevier Computers and Security , vol.28 , Issue.7 , pp. 615-627
    • Hancke, G.1    Mayes, K.2    Markantonakis, K.3
  • 17
    • 79957663054 scopus 로고    scopus 로고
    • RFID distance bounding protocols with mixed challenges
    • May
    • C.H. Kim and G. Avoine, "RFID Distance Bounding Protocols with Mixed Challenges," IEEE Trans. Wireless Comm., vol. 10, no. 5, pp. 1618-1626, May 2011.
    • (2011) IEEE Trans. Wireless Comm , vol.10 , Issue.5 , pp. 1618-1626
    • Kim, C.H.1    Avoine, G.2
  • 20
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for rfid enhanced by using void-challenges and analysis in noisy channels
    • J. Munilla and A. Peinado, "Distance Bounding Protocols for RFID Enhanced by Using Void-Challenges and Analysis in Noisy Channels," Wireless Comm. and Mobile Computing, vol. 8, pp. 1227-1232, 2008.
    • (2008) Wireless Comm. and Mobile Computing , vol.8 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 24
    • 79951677671 scopus 로고    scopus 로고
    • Distance bounding protocol for mutual authentication
    • Feb.
    • D.H. Yum, J.S. Kim, S.J. Hong, and P.J. Lee, "Distance Bounding Protocol for Mutual Authentication," IEEE Trans. Wireless Comm., vol. 10, no. 2, pp. 592-601, Feb. 2011.
    • (2011) IEEE Trans. Wireless Comm , vol.10 , Issue.2 , pp. 592-601
    • Yum, D.H.1    Kim, J.S.2    Hong, S.J.3    Lee, P.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.