Subtle kinks in distance-bounding: an analysis of prominent protocols
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Distance Hijacking Attacks on Distance Bounding Protocols , 2012, 2012 IEEE Symposium on Security and Privacy.
[2] Cédric Lauradoux,et al. A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols , 2009, IACR Cryptol. ePrint Arch..
[3] Marc Fischlin,et al. A Formal Approach to Distance-Bounding RFID Protocols , 2011, ISC.
[4] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[5] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[6] Gildas Avoine,et al. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks , 2009, CANS.
[7] Gildas Avoine,et al. An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement , 2009, ISC.
[8] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[9] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .
[10] Duncan S. Wong,et al. An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy , 2012, ICICS.
[11] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography , 2008 .
[12] B. E. Eckbo,et al. Appendix , 1826, Epilepsy Research.
[13] Serge Vaudenay,et al. On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds! , 2012, LATINCRYPT.
[14] Mohammad Reza Sohizadeh Abyaneh,et al. Security Analysis of Two Distance-Bounding Protocols , 2011, RFIDSec.
[15] Yan Zhang,et al. Security in RFID and Sensor Networks , 2009 .
[16] Cédric Lauradoux,et al. How secret-sharing can defeat terrorist fraud , 2011, WiSec '11.