-
1
-
-
79952262142
-
A formal framework for analyzing RFID distance bounding protocols
-
Avoine, G., Bingol, M.A., Karda, S., Lauradoux, C., Martin, B.: A formal framework for analyzing RFID distance bounding protocols. Journal of Computer Security - Special Issue on RFID System Security (2010)
-
(2010)
Journal of Computer Security - Special Issue on RFID System Security
-
-
Avoine, G.1
Bingol, M.A.2
Karda, S.3
Lauradoux, C.4
Martin, B.5
-
2
-
-
80051887821
-
How secret-sharing can defeat terrorist fraud
-
ACM Press
-
Avoine, G., Lauradoux, C., Martin, B.: How secret-sharing can defeat terrorist fraud. In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, pp. 145-156. ACM Press (2011)
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011
, pp. 145-156
-
-
Avoine, G.1
Lauradoux, C.2
Martin, B.3
-
3
-
-
84976295016
-
Distance-bounding protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993 Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
4
-
-
0013398251
-
Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
-
SEDEP Paris, France
-
Desmedt, Y.: Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them. In: SecuriCom, pp. 15-17. SEDEP Paris, France (1988)
-
(1988)
SecuriCom
, pp. 15-17
-
-
Desmedt, Y.1
-
6
-
-
80054817974
-
A formal approach to distance-bounding RFID protocols
-
Lai, X., Zhou, J., Li, H. (eds.) ISC 2011 Springer, Heidelberg
-
Dürholz, U., Fischlin, M., Kasper, M., Onete, C.: A formal approach to distance-bounding RFID protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 47-62. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7001
, pp. 47-62
-
-
Dürholz, U.1
Fischlin, M.2
Kasper, M.3
Onete, C.4
-
9
-
-
74549219772
-
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
-
Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. Transactions on Wireless Communications 9(1), 384-392 (2010)
-
(2010)
Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 384-392
-
-
Haataja, K.1
Toivanen, P.2
-
11
-
-
33847329743
-
An RFID distance bounding protocol
-
ACM Press
-
Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: SECURECOMM, pp. 67-73. ACM Press (2005)
-
(2005)
SECURECOMM
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
14
-
-
67049155493
-
The Swiss-Knife RFID distance bounding protocol
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008 Springer, Heidelberg
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
15
-
-
35048863385
-
Relay attacks on bluetooth authentication and solutions
-
Levi, A., Çetintaş, E., Aydos, M., Koç, Ç.K., Çaǧlayan, M.U.: Relay attacks on bluetooth authentication and solutions. In: Aykanat, C., Dayar, T., Körpeoǧlu, İ. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 278-288. Springer, Heidelberg (2004) (Pubitemid 39741662)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3280
, pp. 278-288
-
-
Levi, A.1
Cetintas, E.2
Aydos, M.3
Koc, C.K.4
Ufuk, C.M.5
-
16
-
-
84860667771
-
Relay attacks on RFID-based electronic voting systems
-
Report 2009/442
-
Oren, Y., Wool, A.: Relay attacks on RFID-based electronic voting systems. Cryptology ePrint Archive, Report 2009/442 (2009), http://eprint.iacr. org/2009/422.pdf
-
(2009)
Cryptology ePrint Archive
-
-
Oren, Y.1
Wool, A.2
-
17
-
-
84865608549
-
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012 Springer, Heidelberg
-
Ranganathan, A., Tippenhauer, N.O., Škorić, B., Singelée, D., Čapkun, S.: Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 415-432. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 415-432
-
-
Ranganathan, A.1
Tippenhauer, N.O.2
Škorić, B.3
Singelée, D.4
Čapkun, S.5
-
18
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
ACM Press
-
Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS, pp. 204-213. ACM Press (2007)
-
(2007)
ASIACCS
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
|