Results 1 - 10
of
307
Semantic similarity based on corpus statistics and lexical taxonomy
- Proc of 10th International Conference on Research in Computational Linguistics, ROCLING’97
, 1997
"... This paper presents a new approach for measuring semantic similarity/distance between words and concepts. It combines a lexical taxonomy structure with corpus statistical information so that the semantic distance between nodes in the semantic space constructed by the taxonomy can be better quantifie ..."
Abstract
-
Cited by 873 (0 self)
- Add to MetaCart
This paper presents a new approach for measuring semantic similarity/distance between words and concepts. It combines a lexical taxonomy structure with corpus statistical information so that the semantic distance between nodes in the semantic space constructed by the taxonomy can be better
RFID Distance Bounding Protocols
- In First International EURASIP Workshop on RFID Technology
, 2007
"... Abstract – Almost all existing RFID tag/reader authentication protocols are vulnerable to mafia attacks and/or terrorist attacks from adversaries because of their inability to verify location of the tag. Several protocols have been proposed that purport to alleviate these forms of attacks. However, ..."
Abstract
-
Cited by 18 (0 self)
- Add to MetaCart
, vulnerabilities have been identified in most of these protocols. We present and evaluate a modified distance bounding protocol. I.
A formal approach to distance-bounding RFID protocols
- In Information Security Conference (ISC) 2011, LNCS
, 2011
"... Abstract. Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
about relations between the notions, showing instead that they are independent. Finally we use our new framework to assess the security of the RFID distance-bounding scheme due to Kim and Avoine, and enhance it to include impersonation security and allow for errors due to noisy channel transmissions.
Distance Bounding in Noisy Environments
- In Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS ’07), Lecture Notes in Computer Science, LNCS 4572
, 2007
"... Abstract. Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced by Brands and Chaum at Eurocrypt’93 to preclude distance fraud and mafia fraud attacks, in which a local imper ..."
Abstract
-
Cited by 36 (4 self)
- Add to MetaCart
Abstract. Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced by Brands and Chaum at Eurocrypt’93 to preclude distance fraud and mafia fraud attacks, in which a local
The Swiss-Knife RFID Distance Bounding Protocol
- In ICISC (2008
"... Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance boundin ..."
Abstract
-
Cited by 37 (1 self)
- Add to MetaCart
Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
"... Abstract. Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where ..."
Abstract
- Add to MetaCart
the verifier that it is closer to it than in reality; (4) impersonation security, where the prover must authenticate to the verifier in the rounds where response times are not measured. A scenario where distance-bounding can be successfully deployed is RFID authentication, where the provers and RFID tags
A Framework for Analyzing RFID Distance Bounding Protocols
- Journal of Computer Security
, 2011
"... Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we in-troduce a unied framework that aims to im ..."
Abstract
-
Cited by 18 (4 self)
- Add to MetaCart
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we in-troduce a unied framework that aims
Coil sensitivity encoding for fast MRI. In:
- Proceedings of the ISMRM 6th Annual Meeting,
, 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect
RFID distance bounding protocol with mixed challenges to prevent relay attacks.
- In The 8th International Conference on Cryptology And Network Security, CANS
, 2009
"... Abstract-RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man-in ..."
Abstract
-
Cited by 23 (2 self)
- Add to MetaCart
Abstract-RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud. Among them mafia fraud is the most serious one as it can be mounted without the awareness of neither the reader nor the tag. In such an attack, the adversary acts as a man
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
, 2009
"... Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal framework is presented that helps the future attempts to cryptanalyze and des ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal framework is presented that helps the future attempts to cryptanalyze
Results 1 - 10
of
307