-
3
-
-
84976295016
-
Distance-bounding protocols
-
Secaucus, NJ, USA, Springer-Verlag New York, Inc
-
Stefan Brands and David Chaum. Distance-bounding protocols. In EUROCRYPT’93, pages 344–359, Secaucus, NJ, USA, 1994. Springer-Verlag New York, Inc.
-
(1994)
EUROCRYPT’93
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
Srdjan Capkun and Jean-Pierre Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Capkun, S.1
Hubaux, J.-P.2
-
6
-
-
70350347970
-
Position based cryptography
-
Berlin, Heidelberg, Springer-Verlag
-
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky. Position based cryptography. In CRYPTO’09: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, pages 391–407, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
CRYPTO’09: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
, pp. 391-407
-
-
Chandran, N.1
Goyal, V.2
Moriarty, R.3
Ostrovsky, R.4
-
7
-
-
70349088576
-
Secure and precise location verification using distance bounding and simultaneous multilateration
-
New York, NY, USA, ACM
-
Jerry T. Chiang, Jason J. Haas, and Yih-Chun Hu. Secure and precise location verification using distance bounding and simultaneous multilateration. In ACM WiSec’09, pages 181–192, New York, NY, USA, 2009. ACM.
-
(2009)
ACM WiSec’09
, pp. 181-192
-
-
Chiang, J.T.1
Haas, J.J.2
Hu, Y.-C.3
-
9
-
-
38549157035
-
Position statement in RFID s&p panel: From relative security to perceived secure
-
Yvo Desmedt. Position statement in rfid s&p panel: From relative security to perceived secure. In Financial Cryptography, pages 53–56, 2007.
-
(2007)
Financial Cryptography
, pp. 53-56
-
-
Desmedt, Y.1
-
11
-
-
77952350344
-
Effectiveness of distance-decreasing attacks against impulse radio ranging
-
Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. Effectiveness of Distance-Decreasing Attacks Against Impulse Radio Ranging. In 3rd ACM Conference on Wireless Network Security (WiSec), 2010.
-
(2010)
3rd ACM Conference on Wireless Network Security (WiSec)
-
-
Flury, M.1
Poturalski, M.2
Papadimitratos, P.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
12
-
-
85032751286
-
Localization via ultrawideband radios: A look at positioning aspects for future sensor networks
-
July
-
S. Gezici, Zhi Tian, G.B. Giannakis, H. Kobayashi, A.F. Molisch, H.V. Poor, and Z. Sahinoglu. Localization via ultrawideband radios: a look at positioning aspects for future sensor networks. Signal Processing Magazine, IEEE, 22(4):70–84, July 2005.
-
(2005)
Signal Processing Magazine, IEEE
, vol.22
, Issue.4
, pp. 70-84
-
-
Gezici, S.1
Tian, Z.2
Giannakis, G.B.3
Kobayashi, H.4
Molisch, A.F.5
Poor, H.V.6
Sahinoglu, Z.7
-
13
-
-
33847329743
-
An RFID distance bounding protocol
-
Washington, DC, USA, IEEE Computer Society
-
Gerhard P. Hancke and Markus G. Kuhn. An rfid distance bounding protocol. In SecureComm’05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pages 67–73, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SecureComm’05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
14
-
-
56749181480
-
Attacks on time-of-flight distance bounding channels
-
New York, NY, USA, ACM
-
Gerhard P. Hancke and Markus G. Kuhn. Attacks on time-of-flight distance bounding channels. In WiSec’08: Proceedings of the first ACM conference on Wireless net work security, pages 194–202, New York, NY, USA, 2008. ACM.
-
(2008)
WiSec’08: Proceedings of the First ACM Conference on Wireless Net Work Security
, pp. 194-202
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
15
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
San Francisco, USA, April
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of the IEEE Conference on Computer Communications (InfoCom), San Francisco, USA, April 2003.
-
(2003)
Proceedings of the IEEE Conference on Computer Communications (InfoCom)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw., 11(1-2):21–38, 2005.
-
(2005)
Wirel. Netw.
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
18
-
-
50049102546
-
Towards more efficient distance bounding protocols for use in sensor networks
-
Aug. 28 2006-Sept. 1
-
Catherine Meadows, Paul Syverson, and LiWu Chang. Towards more efficient distance bounding protocols for use in sensor networks. Securecomm, pages 1–5, Aug. 28 2006-Sept. 1 2006.
-
(2006)
Securecomm
, pp. 1-5
-
-
Meadows, C.1
Syverson, P.2
LiWu Chang3
-
20
-
-
84870636879
-
-
National Space-Based Positioning, Navigation, and Timing Coordination Office
-
National Space-Based Positioning, Navigation, and Timing Coordination Office. Global positioning system. http://www.gps.gov/.
-
Global Positioning System
-
-
-
23
-
-
70349272427
-
Location privacy of distance bounding protocols
-
New York, NY, USA, ACM
-
Kasper Bonne Rasmussen and Srdjan Čapkun. Location privacy of distance bounding protocols. In CCS’08: Proceedings of the 15th ACM conference on Computer and communications security, pages 149–160, New York, NY, USA, 2008. ACM.
-
(2008)
CCS’08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 149-160
-
-
Rasmussen, K.B.1
Čapkun, S.2
-
24
-
-
42649121951
-
Throughput and energy-efficiency-aware protocol for ultrawideband communication in wireless sensor networks: A cross-layer approach
-
Qingchun Ren and Qilian Liang. Throughput and energy-efficiency-aware protocol for ultrawideband communication in wireless sensor networks: A cross-layer approach. IEEE Transactions on Mobile Computing, 7:805–816, 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.7
, pp. 805-816
-
-
Ren, Q.1
Liang, Q.2
-
25
-
-
1542317849
-
Secure verification of location claims
-
New York, NY, USA, ACM
-
Naveen Sastry, Umesh Shankar, and David Wagner. Secure verification of location claims. In WiSe’03: Proceedings of the 2nd ACM workshop on Wireless security, New York, NY, USA, 2003. ACM.
-
(2003)
WiSe’03: Proceedings of the 2nd ACM Workshop on Wireless Security
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
26
-
-
70350525196
-
Modeling and verifying physical properties of security protocols for wireless networks
-
Washington, DC, USA, IEEE Computer Society
-
Patrick Schaller, Benedikt Schmidt, David Basin, and Srdjan Capkun. Modeling and verifying physical properties of security protocols for wireless networks. In CSF’09: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium, pages 109–123, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
CSF’09: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
, pp. 109-123
-
-
Schaller, P.1
Schmidt, B.2
Basin, D.3
Capkun, S.4
-
30
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
Washington, USA, October
-
S. Čapkun, L. Buttyán, and J.-P. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, USA, October 2003.
-
(2003)
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
31
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
New York, NY, USA, ACM
-
Srdjan Čapkun, Levente Buttyán, and Jean-Pierre Hubaux. Sector: secure tracking of node encounters in multi-hop wireless networks. In ACM SASN’03, pages 21–32, New York, NY, USA, 2003. ACM.
-
(2003)
ACM SASN’03
, pp. 21-32
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
|