-
1
-
-
84856085049
-
Security analysis of two distance-bounding protocols
-
volume 7055 of Lecture Notes in Computer Science. Springer
-
M. R. S. Abyneh. Security analysis of two distance-bounding protocols. In Proceedings of RFIDSec 2011, volume 7055 of Lecture Notes in Computer Science, pages 94-107. Springer, 2011.
-
(2011)
Proceedings of RFIDSec 2011
, pp. 94-107
-
-
Abyneh, M.R.S.1
-
2
-
-
77953895834
-
-
G. Avoine, M. A. Bingol, S. Karda, C. Lauradoux, and B. Martin. A formal framework for cryptanalyzing RFID distance bounding protocols. http://eprint.iacr.org/2009/543.pdf, 2009.
-
(2009)
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
-
-
Avoine, G.1
Bingol, M.A.2
Karda, S.3
Lauradoux, C.4
Martin, B.5
-
4
-
-
70350424442
-
An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement
-
volume 5735 of Lecture Notes in Computer Science. Springer-Verlag
-
G. Avoine and A. Tchamkerten. An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement. In Information Security, volume 5735 of Lecture Notes in Computer Science, pages 250-261. Springer-Verlag, 2009.
-
(2009)
Information Security
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
6
-
-
84976295016
-
Distance-bounding protocols
-
Advances in Cryptology | Eurocrypt'93. Springer-Verlag
-
S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology | Eurocrypt'93, Lecture Notes in Computer Science, pages 344-359. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
9
-
-
0013398251
-
Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
-
SEDEP Paris, France
-
Y. Desmedt. Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In SecuriCom, pages 15-17. SEDEP Paris, France, 1988.
-
(1988)
SecuriCom
, pp. 15-17
-
-
Desmedt, Y.1
-
10
-
-
80054817974
-
A formal approach to distance bounding RFID protocols
-
Proceedings of the 14th Information Security Conference ISC 2011
-
U. Dürholz, M. Fischlin, M. Kasper, and C. Onete. A formal approach to distance bounding RFID protocols. In Proceedings of the 14th Information Security Conference ISC 2011, Lecture Notes in Computer Science, pages 47-62. Springer-Verlag, 2011.
-
(2011)
Lecture Notes in Computer Science. Springer-Verlag
, pp. 47-62
-
-
Dürholz, U.1
Fischlin, M.2
Kasper, M.3
Onete, C.4
-
12
-
-
84879545078
-
-
T. H-Security. Chip-based ID cards pose security risk at airports. http://www.h-online.com/security/news/item/Chip-based-ID-cards-pose-security- risk-at-airports-905662.html, 2010.
-
(2010)
Chip-based ID Cards Pose Security Risk at Airports
-
-
-
13
-
-
33847329743
-
An rfid distance bounding protocol
-
ACM Press
-
G. P. Hancke and M. G. Kuhn. An rfid distance bounding protocol. In SECURECOMM, pages 67-73. ACM Press, 2005.
-
(2005)
SECURECOMM
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
14
-
-
71549138804
-
Rfid distance bounding protocol with mixed challenges to prevent relayattacks
-
volume 5888 of Lecture Notes in Computer Science. Springer-Verlag
-
C. H. Kim and G. Avoine. Rfid distance bounding protocol with mixed challenges to prevent relayattacks. In Proceedings of the 8th International Conference on Cryptology and Networks Security (CANS 2009), volume 5888 of Lecture Notes in Computer Science, pages 119-131. Springer-Verlag, 2009.
-
(2009)
Proceedings of the 8th International Conference on Cryptology and Networks Security (CANS 2009)
, pp. 119-131
-
-
Kim, C.H.1
Avoine, G.2
-
15
-
-
67049155493
-
The swiss-knife RFID distance bounding protocol
-
Proceedings of the 14th Information Security Conference ISC 2011. Springer-Verlag
-
C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The swiss-knife RFID distance bounding protocol. In Proceedings of the 14th Information Security Conference ISC 2011, Lecture Notes in Computer Science, pages 98-115. Springer-Verlag, 2009.
-
(2009)
Lecture Notes in Computer Science
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
16
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
ACM Press
-
J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji. Detecting relay attacks with timing-based protocols. In ASIACCS, pages 204-213. ACM Press, 2007.
-
(2007)
ASIACCS
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
17
-
-
84868337146
-
An efficient single-slow-phase mutually authenticated RFID distance-bounding protocol with tag privacy
-
volume 7618 of Lecture Notes in Computer Science. Springer-Verlag
-
A. Yang, Y. Zhuang, and D. S. Wong. An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance-Bounding Protocol with Tag Privacy. In Information and Communications Security, volume 7618 of Lecture Notes in Computer Science, pages 285-292. Springer-Verlag, 2012.
-
(2012)
Information and Communications Security
, pp. 285-292
-
-
Yang, A.1
Zhuang, Y.2
Wong, D.S.3
|