Relay attacks concerns in wireless ad hoc, sensors, and RFID networks
暂无分享,去创建一个
[1] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[2] Rongxing Lu,et al. Vehicular Ad Hoc Network Security and Privacy , 2015 .
[3] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[4] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[5] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[6] Marta Z. Kwiatkowska,et al. Stochastic Model Checking , 2007, SFM.
[7] Jorge Munilla,et al. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels , 2008 .
[8] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[9] Smail Tedjini,et al. On the weakness of contactless systems under relay attacks , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.
[10] Ian F. Akyildiz,et al. Wireless Sensor Networks: Akyildiz/Wireless Sensor Networks , 2010 .
[11] Xiaodong Lin,et al. Vehicular Ad Hoc Network Security and Privacy: Lin/Vehicular , 2015 .
[12] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .
[13] Michael Hutter,et al. Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks , 2011, 2011 IEEE International Conference on RFID-Technologies and Applications.