• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 307
Next 10 →

Semantic similarity based on corpus statistics and lexical taxonomy

by Jay J. Jiang, David W. Conrath - Proc of 10th International Conference on Research in Computational Linguistics, ROCLING’97 , 1997
"... This paper presents a new approach for measuring semantic similarity/distance between words and concepts. It combines a lexical taxonomy structure with corpus statistical information so that the semantic distance between nodes in the semantic space constructed by the taxonomy can be better quantifie ..."
Abstract - Cited by 873 (0 self) - Add to MetaCart
This paper presents a new approach for measuring semantic similarity/distance between words and concepts. It combines a lexical taxonomy structure with corpus statistical information so that the semantic distance between nodes in the semantic space constructed by the taxonomy can be better

RFID Distance Bounding Protocols

by Yu-ju Tu, Selwyn Piramuthu - In First International EURASIP Workshop on RFID Technology , 2007
"... Abstract – Almost all existing RFID tag/reader authentication protocols are vulnerable to mafia attacks and/or terrorist attacks from adversaries because of their inability to verify location of the tag. Several protocols have been proposed that purport to alleviate these forms of attacks. However, ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
, vulnerabilities have been identified in most of these protocols. We present and evaluate a modified distance bounding protocol. I.

A formal approach to distance-bounding RFID protocols

by Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete - In Information Security Conference (ISC) 2011, LNCS , 2011
"... Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
about relations between the notions, showing instead that they are independent. Finally we use our new framework to assess the security of the RFID distance-bounding scheme due to Kim and Avoine, and enhance it to include impersonation security and allow for errors due to noisy channel transmissions.

Distance Bounding in Noisy Environments

by Bart Preneel - In Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS ’07), Lecture Notes in Computer Science, LNCS 4572 , 2007
"... Abstract. Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced by Brands and Chaum at Eurocrypt’93 to preclude distance fraud and mafia fraud attacks, in which a local imper ..."
Abstract - Cited by 36 (4 self) - Add to MetaCart
Abstract. Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced by Brands and Chaum at Eurocrypt’93 to preclude distance fraud and mafia fraud attacks, in which a local

The Swiss-Knife RFID Distance Bounding Protocol

by Chong Hee Kim, Gildas Avoine - In ICISC (2008
"... Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance boundin ..."
Abstract - Cited by 37 (1 self) - Add to MetaCart
Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy

by Cristina Onete, Tu Darmstadt
"... Abstract. Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where ..."
Abstract - Add to MetaCart
the verifier that it is closer to it than in reality; (4) impersonation security, where the prover must authenticate to the verifier in the rounds where response times are not measured. A scenario where distance-bounding can be successfully deployed is RFID authentication, where the provers and RFID tags

A Framework for Analyzing RFID Distance Bounding Protocols

by Gildas Avoine, Muhammed Ali, Benjamin Martin - Journal of Computer Security , 2011
"... Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we in-troduce a unied framework that aims to im ..."
Abstract - Cited by 18 (4 self) - Add to MetaCart
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we in-troduce a unied framework that aims

Coil sensitivity encoding for fast MRI. In:

by Klaas P Pruessmann , Markus Weiger , Markus B Scheidegger , Peter Boesiger - Proceedings of the ISMRM 6th Annual Meeting, , 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract - Cited by 193 (3 self) - Add to MetaCart
New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect

RFID distance bounding protocol with mixed challenges to prevent relay attacks.

by Chong Hee Kim , Gildas Avoine - In The 8th International Conference on Cryptology And Network Security, CANS , 2009
"... Abstract-RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man-in ..."
Abstract - Cited by 23 (2 self) - Add to MetaCart
Abstract-RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man

A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols

by Gildas Avoine, Muhammed Ali Bingöl, Cédric Lauradoux, Benjamin Martin, et al. , 2009
"... Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal framework is presented that helps the future attempts to cryptanalyze and des ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal framework is presented that helps the future attempts to cryptanalyze
Next 10 →
Results 1 - 10 of 307
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University