메뉴 건너뛰기




Volumn 56, Issue 10, 2013, Pages 1216-1227

On selecting the nonce length in distance-bounding protocols

Author keywords

cryptanalysis; distance bounding protocols; high probability bounds; relay attacks; RFID

Indexed keywords

AUTHENTICATION PROTOCOLS; CHALLENGE RESPONSE; CRYPTANALYSIS; DISTANCE-BOUNDING PROTOCOLS; EXPERIMENTAL ANALYSIS; HIGH PROBABILITY; RELAY ATTACK; SECURITY PARAMETERS;

EID: 84885202616     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxt033     Document Type: Article
Times cited : (14)

References (29)
  • 1
    • 0345964587 scopus 로고
    • Major Security problems with the unforgeable feige-fiat-shamir proofs of identity and how to overcome them
    • Paris, France, March 15-17 SEDEP
    • Desmedt, Y. (1988) Major Security Problems with the ?Unforgeable? (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them. Proc. 6thWorldwide Congress on Computer and Communications Security and Protection-SecuriCom ?88, Paris, France, March 15-17, pp. 147-159. SEDEP.
    • (1988) Proc. 6thWorldwide Congress on Computer and Communications Security and Protection-SecuriCom 88 , pp. 147-159
    • Desmedt, Y.1
  • 2
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Lofthus, Norway, May, Lecture Notes in Computer Science 765 Springer, Berlin
    • Brands, S. and Chaum, D. (1994) Distance-Bounding Protocols. Proc. Advances in Cryptology-EUROCRYPT ?93, Lofthus, Norway, May, Lecture Notes in Computer Science 765, pp. 344-359. Springer, Berlin.
    • (1994) Proc. Advances in Cryptology-EUROCRYPT ?93 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 3
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • Athens, Greece, September 5-9 IEEE Computer Society,Washington DC, USA
    • Hancke, G. and Kuhn, M. (2005) An RFID Distance Bounding Protocol. Proc. SECURECOMM?05, Athens, Greece, September 5-9, pp. 67-73. IEEE Computer Society,Washington DC, USA.
    • (2005) Proc. SECURECOMM?05 , pp. 67-73
    • Hancke, G.1    Kuhn, M.2
  • 4
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • Munilla, J. and Peinado, A. (2008) Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 8, 1227-1232.
    • (2008) Wirel. Commun. Mob. Comput , vol.8 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 6
    • 76549120985 scopus 로고    scopus 로고
    • Attacks on a distance dounding protocol
    • Munilla, J. and Peinado,A. (2010)Attacks on a distance dounding protocol. Comput. Commun., 33, 884-889.
    • (2010) Comput. Commun , vol.33 , pp. 884-889
    • Munilla, J.1    Peinado, A.2
  • 9
    • 63149186354 scopus 로고    scopus 로고
    • Distance bounding protocol for multiple rfid tag authentication
    • In Xu, C.-Z. and Guo M. (eds) Shanghai, China, December IEEE, Washington DC, USA
    • Kapoor, G., Zhou, W. and Piramuthu, S. (2008) Distance Bounding Protocol for Multiple RFID Tag Authentication. In Xu, C.-Z. and Guo, M. (eds), Proc. 2008 IEEE/IFIP Int. Conf. Embedded and Ubiquitous Computing-Volume 02-EUC?08, Shanghai, China, December, pp. 115-120. IEEE, Washington DC, USA.
    • (2008) Proc. 2008 IEEE/IFIP Int. Conf. Embedded and Ubiquitous Computing-Volume 02-EUC?08 , pp. 115-120
    • Kapoor, G.1    Zhou, W.2    Piramuthu, S.3
  • 10
    • 67049155493 scopus 로고    scopus 로고
    • The swiss-knife rfid distance bounding protocol
    • Seoul, Korea, December, Lecture Notes in Computer Science 5461 Springer, Berlin
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X. and Pereira, O. (2008) The Swiss-Knife RFID Distance Bounding Protocol. Int. Conf. Information Security and Cryptology-ICISC, Seoul, Korea, December, Lecture Notes in Computer Science 5461, pp. 98-115. Springer, Berlin.
    • (2008) Int. Conf. Information Security and Cryptology-ICISC , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 11
    • 33847247347 scopus 로고    scopus 로고
    • Embedding distance-bounding protocols within intuitive interactions
    • Germany, Lecture Notes in Computer Science 2802 Springer
    • Bussard, L. and Roudier, Y. (2004) Embedding Distance-Bounding Protocols within Intuitive Interactions. Security in Pervasive Computing: 1st Int. Conf., Boppard, Germany, Lecture Notes in Computer Science 2802, pp. 143-156. Springer.
    • (2004) Security in Pervasive Computing: 1st Int. Conf., Boppard , pp. 143-156
    • Bussard, L.1    Roudier, Y.2
  • 12
    • 84880946542 scopus 로고    scopus 로고
    • Distance-bounding proof of knowledge protocols toavoid terrorist fraud attacks
    • Institute EURECOM
    • Bussard, L. and Bagga, W. (2004) Distance-Bounding Proof of Knowledge Protocols toAvoid Terrorist Fraud Attacks. Technical Report RR-04-109, Institute EURECOM.
    • (2004) Technical Report RR-04-109
    • Bussard, L.1    Bagga, W.2
  • 14
    • 76749124932 scopus 로고    scopus 로고
    • Reid et al distance bounding protocol and mafia fraud attacks over noisy channels
    • Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P. and Castro, J.C.H. (2010) Reid et al.?s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett., 14, 121-123.
    • (2010) IEEE Commun. Lett , vol.14 , pp. 121-123
    • Mitrokotsa, A.1    Dimitrakakis, C.2    Peris-Lopez, P.3    Castro, J.C.H.4
  • 15
    • 81055144596 scopus 로고    scopus 로고
    • A note on a privacy-preserving distance-bounding protocol
    • Beijing, China, November, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg
    • Aumasson, J.-P., Mitrokotsa, A. and Peris-Lopez, P. (2011) A Note on a Privacy-Preserving Distance-Bounding Protocol. Proc. 13th Int. Conf. Information and Communications Security (ICICS 2011), Beijing, China, November, Lecture Notes in Computer Science, pp. 78-92. Springer-Verlag, Berlin, Heidelberg.
    • (2011) Proc. 13th Int. Conf. Information and Communications Security (ICICS 2011) , pp. 78-92
    • Aumasson, J.-P.1    Mitrokotsa, A.2    Peris-Lopez, P.3
  • 20
    • 38549167348 scopus 로고    scopus 로고
    • Passive-only key recovery attacks on RC4
    • 14th Int. Workshop, SAC 2007, Ottawa, Canada, August 16-17, Revised Selected Papers, Lecture Notes in Computer Science 4876 Springer
    • Vaudenay, S. and Vuagnoux, M. (2007) Passive-Only Key Recovery Attacks on RC4. Proc. Selected Areas in Cryptography, 14th Int. Workshop, SAC 2007, Ottawa, Canada, August 16-17, Revised Selected Papers, Lecture Notes in Computer Science 4876, pp. 344-359. Springer.
    • (2007) Proc. Selected Areas in Cryptography , pp. 344-359
    • Vaudenay, S.1    Vuagnoux, M.2
  • 21
    • 84861639928 scopus 로고    scopus 로고
    • Expected loss bounds for authentication in constrained channels
    • Orlando, FL, USA, March IEEE press
    • Dimitrakakis, C., Mitrokotsa, A. and Vaudenay, S. (2012) Expected Loss Bounds for Authentication in Constrained Channels. Proc. INFOCOM 2012, Orlando, FL, USA, March, pp. 478-85. IEEE press.
    • (2012) Proc. INFOCOM 2012 , pp. 478-485
    • Dimitrakakis, C.1    Mitrokotsa, A.2    Vaudenay, S.3
  • 23
    • 77953908044 scopus 로고    scopus 로고
    • QAM backscatter for passive UHF RFID tags
    • April, Orlando, Florida, USA IEEE Press
    • Thomas, S. and Reynolds, M. (2010) QAM Backscatter for Passive UHF RFID tags. Proc. 2010 IEEE Int. Conf. RFID, April, Orlando, Florida, USA, pp. 210-214. IEEE Press.
    • (2010) Proc. 2010 IEEE Int. Conf. RFID , pp. 210-214
    • Thomas, S.1    Reynolds, M.2
  • 24
  • 25
  • 26
    • 84856085049 scopus 로고    scopus 로고
    • Security analysis of two distance-bounding protocols
    • Amherst, MA, USA, June, Lecture Notes in Computer Science 7055 Springer, Berlin
    • Abyaneh, S. and Reza, M. (2011) Security Analysis of Two Distance-Bounding Protocols. Proc. Workshop on RFID Security-RFIDSec?11,Amherst, MA, USA, June, Lecture Notes in Computer Science 7055, pp. 94-107. Springer, Berlin.
    • (2011) Proc. Workshop on RFID Security-RFIDSec?11 , pp. 94-107
    • Abyaneh, S.1    Reza, M.2
  • 28
    • 84972574511 scopus 로고
    • Weighted sums of certain dependent random variables
    • Azuma, K. (1967) Weighted sums of certain dependent random variables. Tôhoku Math. J., 13, 357-367.
    • (1967) Tôhoku Math. J , vol.13 , pp. 357-367
    • Azuma, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.