Author:
Boureanu Ioana,Mitrokotsa Aikaterini,Vaudenay Serge
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Avoine, G., Lauradoux, C., Martin, B.: How Secret-sharing can Defeat Terrorist Fraud. In: Proceedings of the 4th ACM Conference on Wireless Network Security – WiSec 2011, Hamburg, Germany. ACM, ACM Press (June 2011)
2. Lecture Notes in Computer Science;G. Avoine,2009
3. Lecture Notes in Computer Science;S. Brands,1994
4. Cremers, C., Rasmussen, K.B., Čapkun, S.: Distance hijacking attacks on distance bounding protocols. Cryptology ePrint Archive, Report 2011/129 (2011),
http://eprint.iacr.org/
5. Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium, pp. 7:1–7:16. USENIX Association, Berkeley (2007)
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The distance-bounding protocol based on Russian cryptographic algorithms;Journal of Computer Virology and Hacking Techniques;2024-05-17
2. Mechanised Models and Proofs for Distance-Bounding;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
3. From Relay Attacks to Distance-Bounding Protocols;Security of Ubiquitous Computing Systems;2021
4. LURK: Server-Controlled TLS Delegation;2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2020-12
5. Energy-Efficient Distance-Bounding with Residual Charge Computation;IEEE Transactions on Emerging Topics in Computing;2020-04-01