메뉴 건너뛰기




Volumn 7954 LNCS, Issue , 2013, Pages 414-431

Terrorism in distance bounding: Modeling terrorist-fraud resistance

Author keywords

[No Author keywords available]

Indexed keywords

CHALLENGE RESPONSE; DISTANCE BOUNDING; DISTANCE-BOUNDING PROTOCOLS; EFFICIENT CONSTRUCTION; MAN IN THE MIDDLES (MITM); RELAY ATTACK; SECURITY LEVEL; TERRORIST FRAUDS;

EID: 84879873854     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38980-1_26     Document Type: Conference Paper
Times cited : (32)

References (18)
  • 3
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Helleseth, T. (ed.) EUROCRYPT 1993 Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 4
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
    • SEDEP Paris, France
    • Desmedt, Y.: Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them. In: SecuriCom, pp. 15-17. SEDEP Paris, France (1988)
    • (1988) SecuriCom , pp. 15-17
    • Desmedt, Y.1
  • 6
    • 80054817974 scopus 로고    scopus 로고
    • A formal approach to distance-bounding RFID protocols
    • Lai, X., Zhou, J., Li, H. (eds.) ISC 2011 Springer, Heidelberg
    • Dürholz, U., Fischlin, M., Kasper, M., Onete, C.: A formal approach to distance-bounding RFID protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 47-62. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7001 , pp. 47-62
    • Dürholz, U.1    Fischlin, M.2    Kasper, M.3    Onete, C.4
  • 9
    • 74549219772 scopus 로고    scopus 로고
    • Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
    • Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. Transactions on Wireless Communications 9(1), 384-392 (2010)
    • (2010) Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 384-392
    • Haataja, K.1    Toivanen, P.2
  • 11
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • ACM Press
    • Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: SECURECOMM, pp. 67-73. ACM Press (2005)
    • (2005) SECURECOMM , pp. 67-73
    • Hancke, G.P.1    Kuhn, M.G.2
  • 14
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID distance bounding protocol
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008 Springer, Heidelberg
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 16
    • 84860667771 scopus 로고    scopus 로고
    • Relay attacks on RFID-based electronic voting systems
    • Report 2009/442
    • Oren, Y., Wool, A.: Relay attacks on RFID-based electronic voting systems. Cryptology ePrint Archive, Report 2009/442 (2009), http://eprint.iacr. org/2009/422.pdf
    • (2009) Cryptology ePrint Archive
    • Oren, Y.1    Wool, A.2
  • 17
    • 84865608549 scopus 로고    scopus 로고
    • Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
    • Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012 Springer, Heidelberg
    • Ranganathan, A., Tippenhauer, N.O., Škorić, B., Singelée, D., Čapkun, S.: Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 415-432. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7459 , pp. 415-432
    • Ranganathan, A.1    Tippenhauer, N.O.2    Škorić, B.3    Singelée, D.4    Čapkun, S.5
  • 18
    • 34748825630 scopus 로고    scopus 로고
    • Detecting relay attacks with timing-based protocols
    • ACM Press
    • Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: ASIACCS, pp. 204-213. ACM Press (2007)
    • (2007) ASIACCS , pp. 204-213
    • Reid, J.1    Nieto, J.M.G.2    Tang, T.3    Senadji, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.