Grouping-Proof-Distance-Bounding Protocols: Keep all your friends close
نویسندگان
چکیده
منابع مشابه
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
As Alice inserts her card, Bob sends a message to his accomplice, Carol, who is about to pay $2 000 for a expensive diamond ring at honest Dave’s jewellery shop. Carol inserts a counterfeit card into Dave’s terminal. This card is wired to a laptop in her backpack, which communicates with Bob’s laptop using mobile phones. The data to and from Dave’s terminal is relayed to the restaurant’s counte...
متن کاملKeep your nice friends close, but your rich friends closer - Computation offloading using NFC
The increasing complexity of smartphone applications and services necessitate high battery consumption but the growth of smartphones’ battery capacity is not keeping pace with these increasing power demands. To overcome this problem, researchers gave birth to the Mobile Cloud Computing (MCC) research area. In this paper we advance on previous ideas, by proposing and implementing the first known...
متن کاملKeep Your Friends Close: Cell-Cell Contact and Skeletal Myogenesis.
Development of skeletal muscle is a multistage process that includes lineage commitment of multipotent progenitor cells, differentiation and fusion of myoblasts into multinucleated myofibers, and maturation of myofibers into distinct types. Lineage-specific transcriptional regulation lies at the core of this process, but myogenesis is also regulated by extracellular cues. Some of these cues are...
متن کاملAttacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
In the recent IEEE communication letter “Grouping-ProofDistance-Bounding Protocols: Keep All Your Friends Close” by Karlsson and Mitrokotsa, a protocol for grouping-proof distance-bounding (GPDB) is proposed. In this letter, we show that the proof that is generated by the proposed GBDP protocol does not actually prove anything. Furthermore, we provide a construction towards a distance-bounding ...
متن کاملDesigning for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer
It is no surprise to say that attackers have the upper hand on security practitioners today when it comes to host security. There are several causes for this problem ranging from unsafe programming languages to the complexity of modern systems at large, but fundamentally, all of the parties involved in constructing and deploying systems lack a methodology for reasoning about the security impact...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Letters
سال: 2016
ISSN: 1089-7798
DOI: 10.1109/lcomm.2016.2562618