Distance-bounding protocol

Results: 24



#Item
1An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
2Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
3Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
4A note on a privacy-preserving distance-bounding protocol Jean-Philippe Aumasson1 , Aikaterini Mitrokotsa2 , and Pedro Peris-Lopez3 1  Nagravision, Switzerland

A note on a privacy-preserving distance-bounding protocol Jean-Philippe Aumasson1 , Aikaterini Mitrokotsa2 , and Pedro Peris-Lopez3 1 Nagravision, Switzerland

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:41
    5Mind your nonces: cryptanalysis of a privacy-preserving distance bounding protocol Jean-Philippe Aumasson1 , Aikaterini Mitrokotsa2 , and Pedro Peris-Lopez3 1  Nagravision SA, Switzerland

    Mind your nonces: cryptanalysis of a privacy-preserving distance bounding protocol Jean-Philippe Aumasson1 , Aikaterini Mitrokotsa2 , and Pedro Peris-Lopez3 1 Nagravision SA, Switzerland

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:45
      6Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

      Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:32:58
      7Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar  David Wagner

      Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

      Add to Reading List

      Source URL: naveen.ksastry.com

      Language: English - Date: 2013-06-08 15:25:49
      8Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

      Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

      Add to Reading List

      Source URL: members.home.nl

      Language: English - Date: 2013-03-16 15:45:20
      9An RFID distance bounding protocol Computer Laboratory Gerhard P. Hancke, Markus G. Kuhn  Security Group / TAMPER Lab

      An RFID distance bounding protocol Computer Laboratory Gerhard P. Hancke, Markus G. Kuhn Security Group / TAMPER Lab

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-09-24 13:58:54
      10Scalable Grouping-proof Protocol for RFID Tags  Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc

      Scalable Grouping-proof Protocol for RFID Tags Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-12-09 01:55:21