-
1
-
-
0345964587
-
Major Security problems with the unforgeable feige-fiat-shamir proofs of identity and how to overcome them
-
Paris, France, March 15-17 SEDEP
-
Desmedt, Y. (1988) Major Security Problems with the ?Unforgeable? (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them. Proc. 6thWorldwide Congress on Computer and Communications Security and Protection-SecuriCom ?88, Paris, France, March 15-17, pp. 147-159. SEDEP.
-
(1988)
Proc. 6thWorldwide Congress on Computer and Communications Security and Protection-SecuriCom 88
, pp. 147-159
-
-
Desmedt, Y.1
-
2
-
-
84976295016
-
Distance-bounding protocols
-
Lofthus, Norway, May, Lecture Notes in Computer Science 765 Springer, Berlin
-
Brands, S. and Chaum, D. (1994) Distance-Bounding Protocols. Proc. Advances in Cryptology-EUROCRYPT ?93, Lofthus, Norway, May, Lecture Notes in Computer Science 765, pp. 344-359. Springer, Berlin.
-
(1994)
Proc. Advances in Cryptology-EUROCRYPT ?93
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
3
-
-
33847329743
-
An RFID distance bounding protocol
-
Athens, Greece, September 5-9 IEEE Computer Society,Washington DC, USA
-
Hancke, G. and Kuhn, M. (2005) An RFID Distance Bounding Protocol. Proc. SECURECOMM?05, Athens, Greece, September 5-9, pp. 67-73. IEEE Computer Society,Washington DC, USA.
-
(2005)
Proc. SECURECOMM?05
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
-
4
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
Munilla, J. and Peinado, A. (2008) Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 8, 1227-1232.
-
(2008)
Wirel. Commun. Mob. Comput
, vol.8
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
5
-
-
38149028509
-
Distance bounding in noisy environments
-
Cambridge, UK, July, Lecture Notes in Computer Science 4572 Springer, Berlin
-
Singelée, D. and Preneel, B. (2007) Distance Bounding in Noisy Environments. Proc. Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop-ESAS?07, Cambridge, UK, July, Lecture Notes in Computer Science 4572, pp. 101-115. Springer, Berlin.
-
(2007)
Proc. Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop-ESAS?07
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
6
-
-
76549120985
-
Attacks on a distance dounding protocol
-
Munilla, J. and Peinado,A. (2010)Attacks on a distance dounding protocol. Comput. Commun., 33, 884-889.
-
(2010)
Comput. Commun
, vol.33
, pp. 884-889
-
-
Munilla, J.1
Peinado, A.2
-
7
-
-
70350385491
-
RFID Distance Bounding Protocols
-
Vienna, Austria, September EURASIP, Greece
-
Tu, Y.-J. and Piramuthu, S. (2007) RFID Distance Bounding Protocols. Proc. 1st Int. EURASIP Workshop on RFID Technology, Vienna, Austria, September, pp. 67-68. EURASIP, Greece.
-
(2007)
Proc. 1st Int. EURASIP Workshop on RFID Technology
, pp. 67-68
-
-
Tu, Y.-J.1
Piramuthu, S.2
-
8
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
Singapore, March ACM
-
Reid, J., Gonzalez Nieto, J.M., Tang, T. and Senadji, B. (2007) Detecting Relay Attacks with Timing-based Protocols. ASIACCS ?07: Proc. 2nd ACM Symp. Information, Computer and Communications Security, Singapore, March, pp. 204-213. ACM.
-
(2007)
ASIACCS ?07: Proc. 2nd ACM Symp. Information, Computer and Communications Security
, pp. 204-213
-
-
Reid, J.1
Gonzalez Nieto, J.M.2
Tang, T.3
Senadji, B.4
-
9
-
-
63149186354
-
Distance bounding protocol for multiple rfid tag authentication
-
In Xu, C.-Z. and Guo M. (eds) Shanghai, China, December IEEE, Washington DC, USA
-
Kapoor, G., Zhou, W. and Piramuthu, S. (2008) Distance Bounding Protocol for Multiple RFID Tag Authentication. In Xu, C.-Z. and Guo, M. (eds), Proc. 2008 IEEE/IFIP Int. Conf. Embedded and Ubiquitous Computing-Volume 02-EUC?08, Shanghai, China, December, pp. 115-120. IEEE, Washington DC, USA.
-
(2008)
Proc. 2008 IEEE/IFIP Int. Conf. Embedded and Ubiquitous Computing-Volume 02-EUC?08
, pp. 115-120
-
-
Kapoor, G.1
Zhou, W.2
Piramuthu, S.3
-
10
-
-
67049155493
-
The swiss-knife rfid distance bounding protocol
-
Seoul, Korea, December, Lecture Notes in Computer Science 5461 Springer, Berlin
-
Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X. and Pereira, O. (2008) The Swiss-Knife RFID Distance Bounding Protocol. Int. Conf. Information Security and Cryptology-ICISC, Seoul, Korea, December, Lecture Notes in Computer Science 5461, pp. 98-115. Springer, Berlin.
-
(2008)
Int. Conf. Information Security and Cryptology-ICISC
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
11
-
-
33847247347
-
Embedding distance-bounding protocols within intuitive interactions
-
Germany, Lecture Notes in Computer Science 2802 Springer
-
Bussard, L. and Roudier, Y. (2004) Embedding Distance-Bounding Protocols within Intuitive Interactions. Security in Pervasive Computing: 1st Int. Conf., Boppard, Germany, Lecture Notes in Computer Science 2802, pp. 143-156. Springer.
-
(2004)
Security in Pervasive Computing: 1st Int. Conf., Boppard
, pp. 143-156
-
-
Bussard, L.1
Roudier, Y.2
-
12
-
-
84880946542
-
Distance-bounding proof of knowledge protocols toavoid terrorist fraud attacks
-
Institute EURECOM
-
Bussard, L. and Bagga, W. (2004) Distance-Bounding Proof of Knowledge Protocols toAvoid Terrorist Fraud Attacks. Technical Report RR-04-109, Institute EURECOM.
-
(2004)
Technical Report RR-04-109
-
-
Bussard, L.1
Bagga, W.2
-
13
-
-
70349272427
-
Location privacy of distance bounding
-
Alexandria,VA, USA ACM
-
Rasmussen, K. and C? apkun, S. (2008) Location Privacy of Distance Bounding. Proc. Annual Conf. Computer and Communications Security (CCS),Alexandria,VA, USA, pp. 149-160. ACM.
-
(2008)
Proc. Annual Conf. Computer and Communications Security (CCS)
, pp. 149-160
-
-
Rasmussen, K.1
Capkun, S.2
-
14
-
-
76749124932
-
Reid et al distance bounding protocol and mafia fraud attacks over noisy channels
-
Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P. and Castro, J.C.H. (2010) Reid et al.?s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett., 14, 121-123.
-
(2010)
IEEE Commun. Lett
, vol.14
, pp. 121-123
-
-
Mitrokotsa, A.1
Dimitrakakis, C.2
Peris-Lopez, P.3
Castro, J.C.H.4
-
15
-
-
81055144596
-
A note on a privacy-preserving distance-bounding protocol
-
Beijing, China, November, Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg
-
Aumasson, J.-P., Mitrokotsa, A. and Peris-Lopez, P. (2011) A Note on a Privacy-Preserving Distance-Bounding Protocol. Proc. 13th Int. Conf. Information and Communications Security (ICICS 2011), Beijing, China, November, Lecture Notes in Computer Science, pp. 78-92. Springer-Verlag, Berlin, Heidelberg.
-
(2011)
Proc. 13th Int. Conf. Information and Communications Security (ICICS 2011)
, pp. 78-92
-
-
Aumasson, J.-P.1
Mitrokotsa, A.2
Peris-Lopez, P.3
-
16
-
-
85026978523
-
The bussard-bagga and other distance bounding protocols under man-in-the-middle attacks
-
Beijing, China, Lecture Notes in Computer Science Springer
-
Bay, A., Boureanu, I., Mitrokotsa, A., Spulber, I. and Vaudenay, S. (2012) The Bussard-Bagga and Other Distance Bounding Protocols under Man-in-the-Middle Attacks. Proc. Inscrypt?2012, 8th China Int. Conf. Information Security and Cryptology, Beijing, China, Lecture Notes in Computer Science. Springer.
-
(2012)
Proc. Inscrypt?2012, 8th China Int. Conf. Information Security and Cryptology
-
-
Bay, A.1
Boureanu, I.2
Mitrokotsa, A.3
Spulber, I.4
Vaudenay, S.5
-
17
-
-
84873109622
-
Mafia fraud attack against the rc distance-bounding protocol
-
Nice, France, November IEEE Press
-
Mitrokotsa, A., Onete, C. and Vaudenay, S. (2012) Mafia Fraud Attack against the RC Distance-Bounding Protocol. Proc. 2012 IEEE RFIDTechnology and Applications (IEEE RFIDT-A), Nice, France, November, pp. 74-79. IEEE Press.
-
(2012)
Proc. 2012 IEEE RFIDTechnology and Applications IEEE RFIDT-A)
, pp. 74-79
-
-
Mitrokotsa, A.1
Onete, C.2
Vaudenay, S.3
-
18
-
-
77953906142
-
-
Preprint 2009, arXiv: 0906.4618
-
Peris-Lopez, P., Hernandez-Castro, J.-C., Dimitrakakis, C., Mitrokotsa, A. and M.E. Tapiador, J. (2010). Shedding light on RFID distance bounding protocols and terrorist fraud attacks. Preprint, 2009, arXiv:0906.4618.
-
(2010)
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.-C.2
Dimitrakakis, C.3
Mitrokotsa, A.4
Tapiador J, M.E.5
-
19
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
Cam-Winget, N., Housley, R.,Wagner, D. andWalker, J. (2003) Security flaws in 802.11 data link protocols. Commun. ACM, 46, 35-39.
-
(2003)
Commun ACM
, vol.46
, pp. 35-39
-
-
Cam-Winget, N.1
Housley, R.2
Wagner, D.3
Walker, J.4
-
20
-
-
38549167348
-
Passive-only key recovery attacks on RC4
-
14th Int. Workshop, SAC 2007, Ottawa, Canada, August 16-17, Revised Selected Papers, Lecture Notes in Computer Science 4876 Springer
-
Vaudenay, S. and Vuagnoux, M. (2007) Passive-Only Key Recovery Attacks on RC4. Proc. Selected Areas in Cryptography, 14th Int. Workshop, SAC 2007, Ottawa, Canada, August 16-17, Revised Selected Papers, Lecture Notes in Computer Science 4876, pp. 344-359. Springer.
-
(2007)
Proc. Selected Areas in Cryptography
, pp. 344-359
-
-
Vaudenay, S.1
Vuagnoux, M.2
-
21
-
-
84861639928
-
Expected loss bounds for authentication in constrained channels
-
Orlando, FL, USA, March IEEE press
-
Dimitrakakis, C., Mitrokotsa, A. and Vaudenay, S. (2012) Expected Loss Bounds for Authentication in Constrained Channels. Proc. INFOCOM 2012, Orlando, FL, USA, March, pp. 478-85. IEEE press.
-
(2012)
Proc. INFOCOM 2012
, pp. 478-485
-
-
Dimitrakakis, C.1
Mitrokotsa, A.2
Vaudenay, S.3
-
22
-
-
84885194084
-
-
Key College Publishing, CA, USA
-
Bogart, K., Stein, C. and Drysdale, S. (2004) Discrete Math for Computer Science Students. Key College Publishing, CA, USA.
-
(2004)
Discrete Math for Computer Science Students
-
-
Bogart, K.1
Stein, C.2
Drysdale, S.3
-
23
-
-
77953908044
-
QAM backscatter for passive UHF RFID tags
-
April, Orlando, Florida, USA IEEE Press
-
Thomas, S. and Reynolds, M. (2010) QAM Backscatter for Passive UHF RFID tags. Proc. 2010 IEEE Int. Conf. RFID, April, Orlando, Florida, USA, pp. 210-214. IEEE Press.
-
(2010)
Proc. 2010 IEEE Int. Conf. RFID
, pp. 210-214
-
-
Thomas, S.1
Reynolds, M.2
-
24
-
-
70749110732
-
Effects of interferences in UHF RFID systems
-
Lazaro, A., Girbau, D. and Villarino, R. (2009) Effects of interferences in UHF RFID systems. Prog. Electromagn. Res., 98, 445-443.
-
(2009)
Prog. Electromagn. Res
, vol.98
, pp. 445-443
-
-
Lazaro, A.1
Girbau, D.2
Villarino, R.3
-
25
-
-
80051887821
-
How secretsharing can defeat terrorist fraud
-
Hamburg, Germany, June ACM Press, NewYork, NY, USA
-
Avoine, G., Lauradoux, C. and Martin, B. (2011) How secretsharing can defeat terrorist fraud. Proc. 4th ACM Conf. Wireless Network Security-iSec?11, Hamburg, Germany, June, pp. 145-156. ACM Press, NewYork, NY, USA.
-
(2011)
Proc. 4th ACM Conf. Wireless Network Security-iSec?11
, pp. 145-156
-
-
Avoine, G.1
Lauradoux, C.2
Martin, B.3
-
26
-
-
84856085049
-
Security analysis of two distance-bounding protocols
-
Amherst, MA, USA, June, Lecture Notes in Computer Science 7055 Springer, Berlin
-
Abyaneh, S. and Reza, M. (2011) Security Analysis of Two Distance-Bounding Protocols. Proc. Workshop on RFID Security-RFIDSec?11,Amherst, MA, USA, June, Lecture Notes in Computer Science 7055, pp. 94-107. Springer, Berlin.
-
(2011)
Proc. Workshop on RFID Security-RFIDSec?11
, pp. 94-107
-
-
Abyaneh, S.1
Reza, M.2
-
27
-
-
84866021748
-
-
October, Lecture Notes in Computer Science 7533, Santiago, Chile Springer
-
Boureanu, I., Mitrokotsa, A. and Vaudenay, S. (2012) On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols-PRF-nessAlone Does Not Stop the Frauds! Progress in Cryptology-LATINCRYPT 2012-2nd Int. Conf. Cryptology and Information Security in Latin America, October, Lecture Notes in Computer Science 7533, Santiago, Chile, pp. 100-120. Springer.
-
(2012)
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols-PRF-nessAlone Does Not Stop the Frauds! Progress in Cryptology-LATINCRYPT 2012-2nd Int. Conf. Cryptology and Information Security in Latin America
, pp. 100-120
-
-
Boureanu, I.1
Mitrokotsa, A.2
Vaudenay, S.3
-
28
-
-
84972574511
-
Weighted sums of certain dependent random variables
-
Azuma, K. (1967) Weighted sums of certain dependent random variables. Tôhoku Math. J., 13, 357-367.
-
(1967)
Tôhoku Math. J
, vol.13
, pp. 357-367
-
-
Azuma, K.1
|