Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Jorge Toro-Pozo"'
Publikováno v:
IEEE Symposium on Security and Privacy
EMV is the international protocol standard for smartcard payment and is used in over 9 billion cards worldwide. Despite the standard's advertised security, various issues have been previously uncovered, deriving from logical flaws that are hard to sp
Publikováno v:
CCS
Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat some security goals, without revealing their lon
Publikováno v:
IEEE Symposium on Security and Privacy
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants. Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the lo
Publikováno v:
Computer Security ISBN: 9783319990729
ESORICS (1)
ESORICS (1)
Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be vulnerable to desynchronisation attacks, a denial
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74a0365ec5f98dad389fb33d0cc4e76f
https://doi.org/10.1007/978-3-319-99073-6_20
https://doi.org/10.1007/978-3-319-99073-6_20
Publikováno v:
Radio Frequency Identification and IoT Security ISBN: 9783319620237
RFIDSec
RFIDSec
Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa82ff0a44174d06d05c214e0d4969c8
https://doi.org/10.1007/978-3-319-62024-4_10
https://doi.org/10.1007/978-3-319-62024-4_10
Publikováno v:
EuroS&P
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay attacks. A particular class of distance-bounding protocols measures round trip times of a series of one-bit challenge-response cycles, during which th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1955fc22e6ab1bcb553a06656160a447
http://orbilu.uni.lu/handle/10993/26836
http://orbilu.uni.lu/handle/10993/26836