Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions
暂无分享,去创建一个
[1] Marc Fischlin,et al. Subtle kinks in distance-bounding: an analysis of prominent protocols , 2013, WiSec '13.
[2] Frank Sehnke,et al. On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[3] P. Lugli,et al. Analog circuits for physical cryptography , 2009, Proceedings of the 2009 12th International Symposium on Integrated Circuits.
[4] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[5] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[6] Srdjan Capkun,et al. Realization of RF Distance Bounding , 2010, USENIX Security Symposium.
[7] Duncan S. Wong,et al. An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy , 2012, ICICS.
[8] Ulrich Rührmair,et al. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[9] Frederik Armknecht,et al. A Formalization of the Security Features of Physical Functions , 2011, 2011 IEEE Symposium on Security and Privacy.
[10] Serge Vaudenay,et al. Mutual authentication in RFID: security and privacy , 2008, ASIACCS '08.
[11] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[12] Ulrich Rührmair,et al. SIMPL Systems as a Keyless Cryptographic and Security Primitive , 2012, Cryptography and Security.
[13] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[14] Süleyman Kardas,et al. A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions , 2011, IACR Cryptol. ePrint Arch..
[15] Jean-Pierre Seifert,et al. Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[16] Miodrag Potkonjak,et al. Nanoelectronic Solutions for Hardware Security , 2012, IACR Cryptology ePrint Archive.
[17] Rainer Plaga,et al. A Formal Definition and a New Security Mechanism of Physical Unclonable Functions , 2012, MMB/DFT.
[18] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[19] Gang Li,et al. Where is the Tag? , 2011, IEEE Microwave Magazine.
[20] Marc Fischlin,et al. A Formal Approach to Distance-Bounding RFID Protocols , 2011, ISC.
[21] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[22] Srdjan Capkun,et al. Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System , 2012, ESORICS.
[23] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[24] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[25] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[26] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[27] Roel Peeters,et al. Efficient, secure, private distance bounding without key updates , 2013, WiSec '13.
[28] Cédric Lauradoux,et al. Distance Bounding Protocols on TH-UWB Radios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[29] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[30] Yong Guan,et al. Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[31] Srdjan Capkun,et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.