Universally composable secure positioning in the bounded retrieval model

[1]  Hugo Krawczyk,et al.  Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.

[2]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[3]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[4]  John C. Mitchell,et al.  A modular correctness proof of IEEE 802.11i and TLS , 2005, CCS '05.

[5]  Moni Naor,et al.  Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.

[6]  Sinan Gezici,et al.  A Survey on Wireless Position Estimation , 2008, Wirel. Pers. Commun..

[7]  Jinzhou Li,et al.  Source localization and calibration using TDOA and FDOA measurements in the presence of sensor location uncertainty , 2013, Science China Information Sciences.

[8]  Qiang Zhang,et al.  A top-down positioning scheme for underwater wireless sensor networks , 2013, Science China Information Sciences.

[9]  N. Malamuth,et al.  Why Pornography? Models of Functions and Effects , 1984 .

[10]  Markus Jakobsson,et al.  Efficient Constructions for One-Way Hash Chains , 2005, ACNS.

[11]  Rafail Ostrovsky,et al.  Position-Based Cryptography , 2014, SIAM J. Comput..

[12]  Stefan Dziembowski,et al.  Intrusion-Resilience Via the Bounded-Storage Model , 2006, TCC.

[13]  Z. Cao,et al.  Position-Verification in Multi-Channel Model , 2012 .

[14]  Stefan Dziembowski,et al.  Intrusion-Resilient Secret Sharing , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[15]  Yang Chao UC model of secure positioning protocols , 2013 .

[16]  Jianfeng Ma,et al.  Universally composable one-time signature and broadcast authentication , 2010, Science China Information Sciences.

[17]  Rafail Ostrovsky,et al.  Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..

[18]  Jianfeng Ma,et al.  Universally composable secure TNC model and EAP-TNC protocol in IF-T , 2010, Science China Information Sciences.

[19]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[20]  Zhenfu Cao,et al.  Position-Verification in Multi-Channel Models , 2011, IACR Cryptol. ePrint Arch..