Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks

作者: Pedro Peris-Lopez , Juan M. Estévez-Tapiador , Jan C. A. van der Lubbe , Julio César Hernández Castro

DOI:

关键词:

摘要:

参考文章(12)
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira, The Swiss-Knife RFID Distance Bounding Protocol international conference on information security and cryptology. pp. 98- 115 ,(2009) , 10.1007/978-3-642-00730-9_7
Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim, Efficient implementation of pseudorandom functions for electronic seal protection protocols workshop on information security applications. pp. 173- 186 ,(2006) , 10.1007/978-3-540-71093-6_14
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Cipher cryptographic hardware and embedded systems. pp. 450- 466 ,(2007) , 10.1007/978-3-540-74735-2_31
Alberto Peinado, Jorge Munilla, Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels communications and mobile computing. ,vol. 8, pp. 1227- 1232 ,(2008) , 10.1002/WCM.V8:9
Jason Reid, Juan M. Gonzalez Nieto, Tee Tang, Bouchra Senadji, Detecting relay attacks with timing-based protocols Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 204- 213 ,(2007) , 10.1145/1229285.1229314
Selwyn Piramuthu, Protocols for RFID tag/reader authentication decision support systems. ,vol. 43, pp. 897- 914 ,(2007) , 10.1016/J.DSS.2007.01.003
A. Juels, RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications. ,vol. 24, pp. 381- 394 ,(2006) , 10.1109/JSAC.2005.861395
G.P. Hancke, M.G. Kuhn, An RFID Distance Bounding Protocol international workshop on security. pp. 67- 73 ,(2005) , 10.1109/SECURECOMM.2005.56
Martin Hlavác, Tomás Rosa, A Note on the Relay Attacks on e-passports: The Case of Czech e-passports. IACR Cryptology ePrint Archive. ,vol. 2007, pp. 244- ,(2007)