Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Jorge Toro-Pozo"'
Publikováno v:
IEEE Symposium on Security and Privacy
EMV is the international protocol standard for smartcard payment and is used in over 9 billion cards worldwide. Despite the standard's advertised security, various issues have been previously uncovered, deriving from logical flaws that are hard to sp
Publikováno v:
CCS
Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat some security goals, without revealing their lon
Publikováno v:
IEEE Symposium on Security and Privacy
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants. Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the lo
Publikováno v:
Computer Security ISBN: 9783319990729
ESORICS (1)
ESORICS (1)
Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be vulnerable to desynchronisation attacks, a denial
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74a0365ec5f98dad389fb33d0cc4e76f
https://doi.org/10.1007/978-3-319-99073-6_20
https://doi.org/10.1007/978-3-319-99073-6_20
Publikováno v:
Radio Frequency Identification and IoT Security ISBN: 9783319620237
RFIDSec
RFIDSec
Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa82ff0a44174d06d05c214e0d4969c8
https://doi.org/10.1007/978-3-319-62024-4_10
https://doi.org/10.1007/978-3-319-62024-4_10
Publikováno v:
EuroS&P
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay attacks. A particular class of distance-bounding protocols measures round trip times of a series of one-bit challenge-response cycles, during which th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1955fc22e6ab1bcb553a06656160a447
http://orbilu.uni.lu/handle/10993/26836
http://orbilu.uni.lu/handle/10993/26836
Publikováno v:
ACM Transactions on Privacy & Security; Aug2024, Vol. 27 Issue 3, p1-36, 36p
Autor:
AVOINE, GILDAS1 gildas.avoine@irisa.fr, BINGÖL, MUHAMMED ALI2 mabingol@sabanciuniv.edu, BOUREANU, IOANA3 i.boureanu@surrey.ac.uk, ČAPKUN, SRDJAN4 srdjan.capkun@inf.ethz.ch, HANCKE, GERHARD5 gp.hancke@cityu.edu.hk, KARDAŞ, SÜLEYMAN6 suleyman.kardas@batman.edu.tr, CHONG HEE KIM kim@brightsight.com, LAURADOUX, CÉDRIC7 cedric.lauradoux@inria.fr, MARTIN, BENJAMIN8, MUNILLA, JORGE9 munilla@ic.uma.es, PEINADO, ALBERTO apeinado@ic.uma.es, BONNE RASMUSSEN, KASPER10 kasper.rasmussen@cs.ox.ac.uk, SINGELÉE, DAVE11 Dave.Singelee@esat.kuleuven.be, TCHAMKERTEN, ASLAN12 aslan.tchamkerten@telecom-paristech.fr, TRUJILLO-RASUA, ROLANDO13, VAUDENAY, SERGE14 serge.vaudenay@epfl.ch
Publikováno v:
ACM Computing Surveys. Sep2019, Vol. 51 Issue 5, p1-33. 33p.
Publikováno v:
2016 IEEE European Symposium on Security & Privacy (EuroS&P); 2016, p97-111, 15p
Publikováno v:
2016 IEEE European Symposium on Security & Privacy (EuroS&P); 2016, pv-viii, 4p