메뉴 건너뛰기




Volumn 30, Issue , 2007, Pages 279-298

Distance bounding protocols: Authentication logic analysis and collusion attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84882715141     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-46276-9_12     Document Type: Article
Times cited : (54)

References (17)
  • 1
    • 84882653717 scopus 로고    scopus 로고
    • MSSI Completes Phase I1 SBIR Contract for UWB-Based Urban Positioning System ('UPS')-Awarded flM Phase 11 Plus
    • June 27
    • MSSI Completes Phase I1 SBIR Contract for UWB-Based Urban Positioning System ('UPS')-Awarded flM Phase 11 Plus, June 27 2006.
    • (2006)
  • 5
    • 0013398251 scopus 로고
    • Major security problems with the 'unforgeable' Feige-Shamir proofs of identity and how to overcome them
    • Y. Desmedt. Major security problems with the 'unforgeable' Feige-Shamir proofs of identity and how to overcome them. In Proceedings of Securicom '88,1988.
    • (1988) Proceedings of Securicom '88
    • Desmedt, Y.1
  • 7
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558-565,1978.
    • (1978) Commun. ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 10
    • 33144475948 scopus 로고    scopus 로고
    • HiRLoc: Hi-resolution robust localization for wireless sensor networks
    • February
    • Loukas Lazos and Radha Poovendran. HiRLoc: Hi-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communication, 24(2):993-999, February 2006.
    • (2006) IEEE Journal on Selected Areas in Communication , vol.24 , Issue.2 , pp. 993-999
    • Lazos, L.1    Poovendran, R.2
  • 13
    • 70349233292 scopus 로고    scopus 로고
    • Deriving secrecy properties in key establishment protocols
    • In Dieter Gollmann and Andrei Sabelfeld, editors, Springer Verlag, to appear
    • Dusko Pavlovic and Catherine Meadows. Deriving secrecy properties in key establishment protocols. In Dieter Gollmann and Andrei Sabelfeld, editors, Proceedings of ESORZCS 2006, Lecture Notes in Computer Science. Springer Verlag, 2006. to appear.
    • (2006) Proceedings of ESORZCS 2006, Lecture Notes in Computer Science
    • Pavlovic, D.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.