Grouping-Proof-Distance-Bounding Protocols: Keep all your friends close

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks

As Alice inserts her card, Bob sends a message to his accomplice, Carol, who is about to pay $2 000 for a expensive diamond ring at honest Dave’s jewellery shop. Carol inserts a counterfeit card into Dave’s terminal. This card is wired to a laptop in her backpack, which communicates with Bob’s laptop using mobile phones. The data to and from Dave’s terminal is relayed to the restaurant’s counte...

متن کامل

Keep your nice friends close, but your rich friends closer - Computation offloading using NFC

The increasing complexity of smartphone applications and services necessitate high battery consumption but the growth of smartphones’ battery capacity is not keeping pace with these increasing power demands. To overcome this problem, researchers gave birth to the Mobile Cloud Computing (MCC) research area. In this paper we advance on previous ideas, by proposing and implementing the first known...

متن کامل

Keep Your Friends Close: Cell-Cell Contact and Skeletal Myogenesis.

Development of skeletal muscle is a multistage process that includes lineage commitment of multipotent progenitor cells, differentiation and fusion of myoblasts into multinucleated myofibers, and maturation of myofibers into distinct types. Lineage-specific transcriptional regulation lies at the core of this process, but myogenesis is also regulated by extracellular cues. Some of these cues are...

متن کامل

Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol

In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and Mitrokotsa, a protocol for grouping-proof distance-bounding (GPDB) is proposed. In this letter, we show that the proof that is generated by the proposed GBDP protocol does not actually prove anything. Furthermore, we provide a construction towards a distance-bounding ...

متن کامل

Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer

It is no surprise to say that attackers have the upper hand on security practitioners today when it comes to host security. There are several causes for this problem ranging from unsafe programming languages to the complexity of modern systems at large, but fundamentally, all of the parties involved in constructing and deploying systems lack a methodology for reasoning about the security impact...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Letters

سال: 2016

ISSN: 1089-7798

DOI: 10.1109/lcomm.2016.2562618