Towards secure distance bounding
From MaRDI portal
Publication:2946871
DOI10.1007/978-3-662-43933-3_4zbMATH Open1321.94047OpenAlexW365850277MaRDI QIDQ2946871FDOQ2946871
Authors: Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_4
Recommendations
Cites Work
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
- Title not available (Why is that?)
- On Privacy Models for RFID
- The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks
- Secure and lightweight distance-bounding
- Towards secure distance bounding
- On the pseudorandom function assumption in (secure) distance-bounding protocols. PRF-ness alone does not stop the frauds!
Cited In (14)
- Time-based Countermeasures for Relay Attacks on PKES Systems
- Secure and lightweight distance-bounding
- On modeling terrorist frauds. Addressing collusion in distance bounding protocols
- Towards secure distance bounding
- Efficient public-key distance bounding protocol
- Optimal proximity proofs
- Sound proof of proximity of knowledge
- Optimal Proximity Proofs Revisited
- On the security of carrier phase-based ranging
- Security Analysis of Two Distance-Bounding Protocols
- RFID distance bounding multistate enhancement
- Title not available (Why is that?)
- Authentication in constrained settings
- On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
This page was built for publication: Towards secure distance bounding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946871)