Zobrazeno 1 - 10
of 27
pro vyhledávání: '"terrorist fraud"'
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Aslan Tchamkerten, Muhammed Ali Bingöl, Gerhard P. Hancke, Kasper Bonne Rasmussen, Jorge Munilla, Süleyman Kardaş, Benjamin Martin, Dave Singelée, Gildas Avoine, Chong Hee Kim, Cédric Lauradoux, Rolando Trujillo-Rasua, Serge Vaudenay, Srdjan Capkun, Ioana Boureanu, Alberto Peinado
Publikováno v:
ACM Computing Surveys
ACM Computing Surveys, Association for Computing Machinery, 2019, 51 (5), pp.1-33. ⟨10.1145/3264628⟩
ACM Computing Surveys, 2019, 51 (5), pp.1-33. ⟨10.1145/3264628⟩
ACM Computing Surveys, Association for Computing Machinery, 2019, 51 (5), pp.1-33. ⟨10.1145/3264628⟩
ACM Computing Surveys, 2019, 51 (5), pp.1-33. ⟨10.1145/3264628⟩
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the lat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::944992f805805945d1c1bff7e874dd6a
https://hal.archives-ouvertes.fr/hal-02470057
https://hal.archives-ouvertes.fr/hal-02470057
Publikováno v:
NetSys
2015 International Conference and Workshops on Networked Systems (NetSys), 1-8
STARTPAGE=1;ENDPAGE=8;TITLE=2015 International Conference and Workshops on Networked Systems (NetSys)
2015 International Conference and Workshops on Networked Systems (NetSys), 1-8
STARTPAGE=1;ENDPAGE=8;TITLE=2015 International Conference and Workshops on Networked Systems (NetSys)
Distance bounding protocols (DBPs) aim to restrict the acceptable distance between the communication partners of a wireless communication. Despite numerous proposed protocols, recent analyses of DBPs have shown the majority of them to be susceptible
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::11ab9c3c31b55ee7f00dcea8839c44b1
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. Ho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1e3f569c09d316e32eac1b9c7d11295e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Foundations and Practice of Security (FPS)
Foundations and Practice of Security (FPS), Oct 2015, Clermont Ferrand, France. pp.29-49, ⟨10.1007/978-3-319-30303-1_3⟩
Foundations and Practice of Security ISBN: 9783319303024
FPS
Foundations and Practice of Security (FPS), Oct 2015, Clermont Ferrand, France. pp.29-49, ⟨10.1007/978-3-319-30303-1_3⟩
Foundations and Practice of Security ISBN: 9783319303024
FPS
International audience; NFC and RFID are technologies that are more and more present in our life. These technologies allow a tag to communicate without contact with a reader. In wireless communication an intruder can always listen and forward a signa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::870553a2fe59df271f2beddac4f5f711
https://hal.archives-ouvertes.fr/hal-01588557/file/FPS.pdf
https://hal.archives-ouvertes.fr/hal-01588557/file/FPS.pdf
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
RFID. Security and Privacy ISBN: 9783642252853
RFIDSec
Web of Science
RFIDSec
Web of Science
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aba4ae39460a48e1e5d253c120bd65c9
https://doi.org/10.1007/978-3-642-25286-0_6
https://doi.org/10.1007/978-3-642-25286-0_6
Publikováno v:
ACM Conference on Wireless Network Security (WiSec)
ACM Conference on Wireless Network Security (WiSec), ACM, Jun 2011, Hamburg, France
WISEC
ACM Conference on Wireless Network Security (WiSec), ACM, Jun 2011, Hamburg, France
WISEC
International audience; Terrorist fraud is a relay attack against distance bounding protocols where the prover conspires with an adversary to misrepresent the distance between himself and the verifier. In ideal situations, the adversary does not gain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a3a1387738954f7f410ebf84b1b3ad98
https://hal.inria.fr/inria-00611808
https://hal.inria.fr/inria-00611808
Autor:
Bussard, Laurent, Bagga, Walid
Publikováno v:
Research report RR-04-109
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1093::08690038a4f9cf1c12c3c31ddfd15c88
http://www.eurecom.fr/publication/1408
http://www.eurecom.fr/publication/1408