• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 23
Next 10 →

Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols

by Gildas Avoine, Iwen Coisel, Tania Martin
"... Abstract. Privacy is one of the most important security concerns in radio frequency identification. The publication of hundred RFID-based authentication protocols during the last decade raised the need of design-ing a dedicated privacy model. An important step has been done with the model of Vaudena ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Privacy is one of the most important security concerns in radio frequency identification. The publication of hundred RFID-based authentication protocols during the last decade raised the need of design-ing a dedicated privacy model. An important step has been done with the model

The Swiss-Knife RFID Distance Bounding Protocol

by Chong Hee Kim, Gildas Avoine - In ICISC (2008
"... Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forward-ing the signal between the verifier and an out-of-field prover. Distance boundin ..."
Abstract - Cited by 37 (1 self) - Add to MetaCart
bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. Sev-eral such protocols have been designed during the last years but none of them combine all the features one may expect in a RFID system. We introduce in this paper

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy

by Cristina Onete, Tu Darmstadt
"... Abstract. Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where ..."
Abstract - Add to MetaCart
Abstract. Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where

Practical Schemes For Privacy & Security Enhanced RFID (extended abstract

by Jaap-henk Hoepman, Rieks Joosten , 2009
"... Abstract. Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather cost ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine

A Secure Authentication Scheme for Ubiquitous Computing

by Shruti S. Utpat, Parikshit N. Mahalle
"... Ubiquitous Computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them efficiently invisible to the user. The ubiquitous networking capabilities support various classes of applications/services which require “Any Services, ..."
Abstract - Add to MetaCart
and authentication of the object. As in ubiquitous computing identity of object and its authentication to the system plays a very vital role. In today’s world of technology the biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers and providing secure

Practical affiliation-hiding authentication from improved polynomial interpolation

by Mark Manulis, Bertram Poettering - In ASIACCS’11 , 2011
"... Abstract. Among the plethora of privacy-friendly authentication techniques, affiliationhiding (AH) protocols are valuable for their ability to hide not only identities of communicating users behind their affiliations (memberships to groups), but also these affiliations from non-members. These qualit ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
Abstract. Among the plethora of privacy-friendly authentication techniques, affiliationhiding (AH) protocols are valuable for their ability to hide not only identities of communicating users behind their affiliations (memberships to groups), but also these affiliations from non

(www.interscience.wiley.com) DOI: 10.1002/sec.120 eRIPP-FS: Enforcing privacy and security in RFID

by Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi
"... In RFID systems addressing security issues, many authentication techniques require the tag to keep some sort of synchronization with the reader. In particular, this is true in those proposals that leverage hash chains. When the reader and the tag get de-synchronized, possibly by an attacker, this pa ..."
Abstract - Add to MetaCart
, this paves the way to several denial of service (DoS) attacks, as well as threatening privacy (e.g., via the timing attack). Even if de-synchronization happens for non-malicious causes, this event has a negative effect on performances (for instance, slowing down the authentication process). In this paper, we

Preprint Id: sensorpets.tex 52 2010-02-25 14:02:07Z jhh Practical Schemes For Privacy & Security Enhanced RFID

by Jaap-henk Hoepman, Rieks Joosten , 2010
"... Abstract Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side, ..."
Abstract - Add to MetaCart
Abstract Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side

Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt

by Alexander Klink, Betreut Von Evangelos Karatsiolis, Technische Universität Darmstadt, Fachbereich Informatik, Fachgebiet Theoretische Informatik
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract - Add to MetaCart
I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant

MPEG-4 for Interactive Low-delay Real-time Communication

by Olaf L, Gary Minden , 2003
"... ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet. ..."
Abstract - Add to MetaCart
ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet
Next 10 →
Results 1 - 10 of 23
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University