메뉴 건너뛰기




Volumn 8162 LNCS, Issue , 2013, Pages 97-113

Secure and lightweight distance-bounding

Author keywords

[No Author keywords available]

Indexed keywords

DISTANCE-BOUNDING PROTOCOLS; PRACTICAL SOLUTIONS; PSEUDO-RANDOM FUNCTIONS; RELAY ATTACK; SECURITY ANALYSIS;

EID: 84886770905     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40392-7_8     Document Type: Conference Paper
Times cited : (37)

References (37)
  • 1
    • 81055144596 scopus 로고    scopus 로고
    • A Note on a Privacy-Preserving Distance-Bounding Protocol
    • Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. Springer, Heidelberg
    • Aumasson, J.-P., Mitrokotsa, A., Peris-Lopez, P.: A Note on a Privacy-Preserving Distance-Bounding Protocol. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 78-92. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7043 , pp. 78-92
    • Aumasson, J.-P.1    Mitrokotsa, A.2    Peris-Lopez, P.3
  • 4
    • 84880927772 scopus 로고    scopus 로고
    • The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks
    • Kuty?owski, M., Yung, M. (eds.) Inscrypt 2012. Springer, Heidelberg
    • Bay, A., Boureanu, I., Mitrokotsa, A., Spulber, I., Vaudenay, S.: The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. In: Kuty?owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 371-391. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7763 , pp. 371-391
    • Bay, A.1    Boureanu, I.2    Mitrokotsa, A.3    Spulber, I.4    Vaudenay, S.5
  • 6
    • 84866021748 scopus 로고    scopus 로고
    • On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols
    • Hevia, A., Neven, G. (eds.) LatinCrypt 2012. Springer, Heidelberg
    • Boureanu, I., Mitrokotsa, A., Vaudenay, S.: On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol. 7533, pp. 100-120. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7533 , pp. 100-120
    • Boureanu, I.1    Mitrokotsa, A.2    Vaudenay, S.3
  • 9
    • 84976295016 scopus 로고
    • Distance-Bounding Protocols
    • (Extended Abstract). Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance-Bounding Protocols (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 11
    • 84885078444 scopus 로고    scopus 로고
    • Distance-bounding proof of knowledge to avoid real-time attacks
    • Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Springer, Boston
    • Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Security and Privacy in the Age of Ubiquitous Computing. IFIP AICT, vol. 181, pp. 223-238. Springer, Boston (2005)
    • (2005) Security and Privacy in the Age of Ubiquitous Computing. IFIP AICT , vol.181 , pp. 223-238
    • Bussard, L.1    Bagga, W.2
  • 16
    • 80054817974 scopus 로고    scopus 로고
    • A Formal Approach to Distance-Bounding RFID Protocols
    • Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. Springer, Heidelberg
    • Dürholz, U., Fischlin, M., Kasper, M., Onete, C.: A Formal Approach to Distance-Bounding RFID Protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 47-62. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7001 , pp. 47-62
    • Dürholz, U.1    Fischlin, M.2    Kasper, M.3    Onete, C.4
  • 17
    • 84879513006 scopus 로고    scopus 로고
    • Subtle kinks in distance-bounding: An analysis of prominent protocols
    • Fischlin, M., Onete, C.: Subtle kinks in distance-bounding: an analysis of prominent protocols. In: WISEC, pp. 195-206 (2013)
    • (2013) WISEC , pp. 195-206
    • Fischlin, M.1    Onete, C.2
  • 19
    • 79952268198 scopus 로고    scopus 로고
    • Non-uniform Stepping Approach to RFID Distance Bounding Problem
    • Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. Springer, Heidelberg
    • Özhan Gürel, A., Arslan, A., Akgün, M.: Non-uniform Stepping Approach to RFID Distance Bounding Problem. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 64-78. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6514 , pp. 64-78
    • Özhan Gürel, A.1    Arslan, A.2    Akgün, M.3
  • 20
    • 84873150532 scopus 로고    scopus 로고
    • Distance-bounding for RFID: Effectiveness of 'terrorist fraud' in the presence of bit errors
    • Hancke, G.P.: Distance-bounding for RFID: Effectiveness of 'terrorist fraud' in the presence of bit errors. In: RFID-TA, pp. 91-96 (2012)
    • (2012) RFID-TA , pp. 91-96
    • Hancke, G.P.1
  • 21
    • 33847329743 scopus 로고    scopus 로고
    • An RFID Distance Bounding Protocol
    • ACM
    • Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: SECURECOMM, pp. 67-73. ACM (2005)
    • (2005) SECURECOMM , pp. 67-73
    • Hancke, G.P.1    Kuhn, M.G.2
  • 22
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58(301), 13-30 (1963)
    • (1963) Journal of the American Statistical Association , vol.58 , Issue.301 , pp. 13-30
    • Hoeffding, W.1
  • 24
    • 71549138804 scopus 로고    scopus 로고
    • RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 119-133
    • Kim, C.H.1    Avoine, G.2
  • 25
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID Distance Bounding Protocol
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 29
    • 55349135872 scopus 로고    scopus 로고
    • Distance Bounding Protocols for RFID Enhanced by Using Void-challenges and Analysis in Noisy Channels
    • Munilla, J., Peinado, A.: Distance Bounding Protocols for RFID Enhanced by Using Void-challenges and Analysis in Noisy Channels. Wireless Communications and Mobile Computing 8, 1227-1232 (2008)
    • (2008) Wireless Communications and Mobile Computing , vol.8 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 31
    • 76549120985 scopus 로고    scopus 로고
    • Attacks on a Distance Bounding Protocol
    • Munilla, J., Peinado, A.: Attacks on a Distance Bounding Protocol. Computer Communications 33, 884-889 (2010)
    • (2010) Computer Communications , vol.33 , pp. 884-889
    • Munilla, J.1    Peinado, A.2
  • 35
    • 38149028509 scopus 로고    scopus 로고
    • Distance Bounding in Noisy Environments
    • Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
    • Singelée, D., Preneel, B.: Distance Bounding in Noisy Environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101-115. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4572 , pp. 101-115
    • Singelée, D.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.