Results 1 - 10
of
5,979
On the Need for Secure Distance-Bounding
"... Abstract. Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers ’ outputs have recently ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract. Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers ’ outputs have recently
Wireless mesh networks: a survey
- COMPUTER NETWORKS
, 2005
"... Wireless meshnet8Ex8 (WMNs)consist of meshrout6L and meshclient8 where meshroutfix have minimal mobilit and formtr backbone of WMNs. They provide netide access for bot mesh andconvent1)fi8 clientt TheintL gratLfl of WMNs wit ot8 net8866 such as t1Int6fiPx1 cellular, IEEE 802.11, IEEE 802.15, IEEE 8 ..."
Abstract
-
Cited by 687 (12 self)
- Add to MetaCart
performance of ad hocnetLEP8L wireless local area net1Pxx (WLANs), wireless personal areanet16fij (WPANs), and wirelessmetess1fifljfl areanet1LPS (WMANs). They are undergoing rapid progress and inspiring numerousdeploymentS WMNs will deliver wireless services for a largevariet ofapplicat6fifl in personal
Challenges in Distance-Bounding
"... Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk can be mitigated through the use ..."
Abstract
- Add to MetaCart
of distance-bounding protocols. In this paper, we discuss the core challenges for distance-bounding, in terms of both theoretical and practical considerations. We focus on their security, but we also explore the difficulties encountered in their design and implementation. Moreover, we present our vision
Secure & Lightweight Distance-Bounding
"... Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical t ..."
Abstract
-
Cited by 9 (6 self)
- Add to MetaCart
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect against as many, if not all, of the classical
Architectural Styles and the Design of Network-based Software Architectures
, 2000
"...
The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The Web has been iteratively developed over the past ten years through a series of modifications to the standards that define its ..."
Abstract
-
Cited by 1119 (1 self)
- Add to MetaCart
defines a framework for understanding software architecture via architectural styles and demonstrates how styles can be used to guide the architectural design of network-based application software. A survey of architectural styles for network-based applications is used to classify styles according
Distance-bounding facing both mafia and
"... Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia and distance frauds. Both frauds aim at passing an authentication protocol by cheating on the actual distance be-tween the prover and the verifier. To cope these security issues, distance-bounding prot ..."
Abstract
- Add to MetaCart
on the communication channels. This ar-ticle introduces a noise-resilient distance-bounding protocol that resists to both mafia and distance frauds. The security of the protocol is ana-lyzed with respect to these two frauds in both scenarios, namely noisy and noiseless channels. Analytical expressions
RFID security and privacy: A research survey
- ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008
, 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract
-
Cited by 353 (6 self)
- Add to MetaCart
, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers. Index Terms—Authentication, cloning, counterfeiting, electronic product code (EPC), privacy, radio frequency identification (RFID), security. I.
On the Pseudorandom Function Assumption in (Secure) DistanceBounding Protocols
- In International Conference on Cryptology and Information Security in Latin America Latincrypt
, 2012
"... Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient. ..."
Abstract
-
Cited by 12 (8 self)
- Add to MetaCart
Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient
Investor psychology and asset pricing
, 2001
"... The basic paradigm of asset pricing is in vibrant flux. The purely rational approach is being subsumed by a broader approach based upon the psychology of investors. In this approach, security expected returns are determined by both risk and misvaluation. This survey sketches a framework for understa ..."
Abstract
-
Cited by 420 (27 self)
- Add to MetaCart
The basic paradigm of asset pricing is in vibrant flux. The purely rational approach is being subsumed by a broader approach based upon the psychology of investors. In this approach, security expected returns are determined by both risk and misvaluation. This survey sketches a framework
Yet Another Secure Distance-Bounding Protocol
"... Abstract. Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fifteen years ago, only recently distance-bounding protocols attracted the attention of the researchers. Several new ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
new protocols have been proposed the last five years. In this paper, a new secure distance-bounding protocol is presented. It is self-contained and composable with other protocols for example for authentication or key-negotiation. It allows periodically execution and achieves better use
Results 1 - 10
of
5,979