메뉴 건너뛰기




Volumn , Issue , 2013, Pages 195-206

Subtle kinks in distance-bounding: Analysis of prominent protocols

Author keywords

Cryptographic protocol; Distance bounding; Provable security

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; DENIAL-OF -SERVICE; DISTANCE FRAUDS; DISTANCE-BOUNDING; DISTANCE-BOUNDING PROTOCOLS; PROVABLE SECURITY; TERRORIST ATTACKS; TERRORIST FRAUDS;

EID: 84879513006     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462096.2462128     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 1
    • 84856085049 scopus 로고    scopus 로고
    • Security analysis of two distance-bounding protocols
    • volume 7055 of Lecture Notes in Computer Science. Springer
    • M. R. S. Abyneh. Security analysis of two distance-bounding protocols. In Proceedings of RFIDSec 2011, volume 7055 of Lecture Notes in Computer Science, pages 94-107. Springer, 2011.
    • (2011) Proceedings of RFIDSec 2011 , pp. 94-107
    • Abyneh, M.R.S.1
  • 4
    • 70350424442 scopus 로고    scopus 로고
    • An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement
    • volume 5735 of Lecture Notes in Computer Science. Springer-Verlag
    • G. Avoine and A. Tchamkerten. An efficient distance bounding rfid authentication protocol: Balancing false-acceptance rate and memory requirement. In Information Security, volume 5735 of Lecture Notes in Computer Science, pages 250-261. Springer-Verlag, 2009.
    • (2009) Information Security , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 6
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Advances in Cryptology | Eurocrypt'93. Springer-Verlag
    • S. Brands and D. Chaum. Distance-bounding protocols. In Advances in Cryptology | Eurocrypt'93, Lecture Notes in Computer Science, pages 344-359. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 9
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them
    • SEDEP Paris, France
    • Y. Desmedt. Major security problems with the 'unforgeable' (Feige)-Fiat-Shamir proofs of identity and how to overcome them. In SecuriCom, pages 15-17. SEDEP Paris, France, 1988.
    • (1988) SecuriCom , pp. 15-17
    • Desmedt, Y.1
  • 10
    • 80054817974 scopus 로고    scopus 로고
    • A formal approach to distance bounding RFID protocols
    • Proceedings of the 14th Information Security Conference ISC 2011
    • U. Dürholz, M. Fischlin, M. Kasper, and C. Onete. A formal approach to distance bounding RFID protocols. In Proceedings of the 14th Information Security Conference ISC 2011, Lecture Notes in Computer Science, pages 47-62. Springer-Verlag, 2011.
    • (2011) Lecture Notes in Computer Science. Springer-Verlag , pp. 47-62
    • Dürholz, U.1    Fischlin, M.2    Kasper, M.3    Onete, C.4
  • 12
  • 13
    • 33847329743 scopus 로고    scopus 로고
    • An rfid distance bounding protocol
    • ACM Press
    • G. P. Hancke and M. G. Kuhn. An rfid distance bounding protocol. In SECURECOMM, pages 67-73. ACM Press, 2005.
    • (2005) SECURECOMM , pp. 67-73
    • Hancke, G.P.1    Kuhn, M.G.2
  • 14
    • 71549138804 scopus 로고    scopus 로고
    • Rfid distance bounding protocol with mixed challenges to prevent relayattacks
    • volume 5888 of Lecture Notes in Computer Science. Springer-Verlag
    • C. H. Kim and G. Avoine. Rfid distance bounding protocol with mixed challenges to prevent relayattacks. In Proceedings of the 8th International Conference on Cryptology and Networks Security (CANS 2009), volume 5888 of Lecture Notes in Computer Science, pages 119-131. Springer-Verlag, 2009.
    • (2009) Proceedings of the 8th International Conference on Cryptology and Networks Security (CANS 2009) , pp. 119-131
    • Kim, C.H.1    Avoine, G.2
  • 15
    • 67049155493 scopus 로고    scopus 로고
    • The swiss-knife RFID distance bounding protocol
    • Proceedings of the 14th Information Security Conference ISC 2011. Springer-Verlag
    • C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The swiss-knife RFID distance bounding protocol. In Proceedings of the 14th Information Security Conference ISC 2011, Lecture Notes in Computer Science, pages 98-115. Springer-Verlag, 2009.
    • (2009) Lecture Notes in Computer Science , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 16
    • 34748825630 scopus 로고    scopus 로고
    • Detecting relay attacks with timing-based protocols
    • ACM Press
    • J. Reid, J. M. G. Nieto, T. Tang, and B. Senadji. Detecting relay attacks with timing-based protocols. In ASIACCS, pages 204-213. ACM Press, 2007.
    • (2007) ASIACCS , pp. 204-213
    • Reid, J.1    Nieto, J.M.G.2    Tang, T.3    Senadji, B.4
  • 17
    • 84868337146 scopus 로고    scopus 로고
    • An efficient single-slow-phase mutually authenticated RFID distance-bounding protocol with tag privacy
    • volume 7618 of Lecture Notes in Computer Science. Springer-Verlag
    • A. Yang, Y. Zhuang, and D. S. Wong. An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance-Bounding Protocol with Tag Privacy. In Information and Communications Security, volume 7618 of Lecture Notes in Computer Science, pages 285-292. Springer-Verlag, 2012.
    • (2012) Information and Communications Security , pp. 285-292
    • Yang, A.1    Zhuang, Y.2    Wong, D.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.