Gil-Pons et al., 2023 - Google Patents
On the optimal resistance against mafia and distance fraud in distance-bounding protocolsGil-Pons et al., 2023
View HTML- Document ID
- 11569769639919907936
- Author
- Gil-Pons R
- Mauw S
- Trujillo-Rasua R
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
Distance-bounding protocols are security protocols with a time measurement phase used to detect relay attacks, whose security is typically measured against mafia-fraud and distance- fraud attacks. A prominent subclass of distance-bounding protocols, known as lookup-based …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2247024B1 (en) | Determining the validity of a connection between a reader and a transponder | |
Piramuthu | Protocols for RFID tag/reader authentication | |
CN111971930B (en) | Computer-implemented system and method adapted to improve instant offline blockchain transaction security | |
US12219347B2 (en) | Secure on-demand ultra-wideband communication channels systems and methods | |
US10044512B2 (en) | Decoupling of measuring the response time of a transponder and its authentication | |
Piramuthu | On existence proofs for multiple RFID tags | |
Drimer et al. | Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. | |
Meadows et al. | Distance bounding protocols: Authentication logic analysis and collusion attacks | |
Kim et al. | RFID distance bounding protocol with mixed challenges to prevent relay attacks | |
Sun et al. | A hash-based RFID security protocol for strong privacy protection | |
US10546444B2 (en) | Systems and methods for secure read-only authentication | |
Piramuthu et al. | On sensor-based solutions for simultaneous presence of multiple RFID tags | |
US20240430683A1 (en) | System and methods for data security using distance measurement | |
Gil-Pons et al. | On the optimal resistance against mafia and distance fraud in distance-bounding protocols | |
US9450765B2 (en) | System and method capable of verifying contactless sensor tag | |
Kapoor et al. | Distance bounding protocol for multiple RFID tag authentication | |
Oh et al. | Countermeasure of NFC relay attack with jamming | |
Munilla et al. | Security analysis of Tu and Piramuthu's protocol | |
González-Tablas et al. | Survey on location authentication protocols and spatial-temporal attestation services | |
Chothia et al. | Making contactless emv robust against rogue readers colluding with relay attackers | |
JPH0749839A (en) | Authentication system using chaos, authentication device, device to be authenticated, and authentication method | |
Xin et al. | A distance bounding protocol using error state and punishment | |
Rad et al. | Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols | |
Xu et al. | Novel implementation of defence strategy of relay attack based on cloud in RFID systems | |
Boureanu et al. | Here and there at once, with my mobile phone! |