[go: up one dir, main page]

Gil-Pons et al., 2023 - Google Patents

On the optimal resistance against mafia and distance fraud in distance-bounding protocols

Gil-Pons et al., 2023

View HTML
Document ID
11569769639919907936
Author
Gil-Pons R
Mauw S
Trujillo-Rasua R
Publication year
Publication venue
Computer Communications

External Links

Snippet

Distance-bounding protocols are security protocols with a time measurement phase used to detect relay attacks, whose security is typically measured against mafia-fraud and distance- fraud attacks. A prominent subclass of distance-bounding protocols, known as lookup-based …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Similar Documents

Publication Publication Date Title
EP2247024B1 (en) Determining the validity of a connection between a reader and a transponder
Piramuthu Protocols for RFID tag/reader authentication
CN111971930B (en) Computer-implemented system and method adapted to improve instant offline blockchain transaction security
US12219347B2 (en) Secure on-demand ultra-wideband communication channels systems and methods
US10044512B2 (en) Decoupling of measuring the response time of a transponder and its authentication
Piramuthu On existence proofs for multiple RFID tags
Drimer et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.
Meadows et al. Distance bounding protocols: Authentication logic analysis and collusion attacks
Kim et al. RFID distance bounding protocol with mixed challenges to prevent relay attacks
Sun et al. A hash-based RFID security protocol for strong privacy protection
US10546444B2 (en) Systems and methods for secure read-only authentication
Piramuthu et al. On sensor-based solutions for simultaneous presence of multiple RFID tags
US20240430683A1 (en) System and methods for data security using distance measurement
Gil-Pons et al. On the optimal resistance against mafia and distance fraud in distance-bounding protocols
US9450765B2 (en) System and method capable of verifying contactless sensor tag
Kapoor et al. Distance bounding protocol for multiple RFID tag authentication
Oh et al. Countermeasure of NFC relay attack with jamming
Munilla et al. Security analysis of Tu and Piramuthu's protocol
González-Tablas et al. Survey on location authentication protocols and spatial-temporal attestation services
Chothia et al. Making contactless emv robust against rogue readers colluding with relay attackers
JPH0749839A (en) Authentication system using chaos, authentication device, device to be authenticated, and authentication method
Xin et al. A distance bounding protocol using error state and punishment
Rad et al. Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
Xu et al. Novel implementation of defence strategy of relay attack based on cloud in RFID systems
Boureanu et al. Here and there at once, with my mobile phone!