Two-Hop Distance-Bounding Protocols: Keep Your Friends Close
نویسندگان
چکیده
منابع مشابه
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
As Alice inserts her card, Bob sends a message to his accomplice, Carol, who is about to pay $2 000 for a expensive diamond ring at honest Dave’s jewellery shop. Carol inserts a counterfeit card into Dave’s terminal. This card is wired to a laptop in her backpack, which communicates with Bob’s laptop using mobile phones. The data to and from Dave’s terminal is relayed to the restaurant’s counte...
متن کاملKeep your nice friends close, but your rich friends closer - Computation offloading using NFC
The increasing complexity of smartphone applications and services necessitate high battery consumption but the growth of smartphones’ battery capacity is not keeping pace with these increasing power demands. To overcome this problem, researchers gave birth to the Mobile Cloud Computing (MCC) research area. In this paper we advance on previous ideas, by proposing and implementing the first known...
متن کاملKeep Your Friends Close: Cell-Cell Contact and Skeletal Myogenesis.
Development of skeletal muscle is a multistage process that includes lineage commitment of multipotent progenitor cells, differentiation and fusion of myoblasts into multinucleated myofibers, and maturation of myofibers into distinct types. Lineage-specific transcriptional regulation lies at the core of this process, but myogenesis is also regulated by extracellular cues. Some of these cues are...
متن کاملDesigning for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer
It is no surprise to say that attackers have the upper hand on security practitioners today when it comes to host security. There are several causes for this problem ranging from unsafe programming languages to the complexity of modern systems at large, but fundamentally, all of the parties involved in constructing and deploying systems lack a methodology for reasoning about the security impact...
متن کاملSecurity Analysis of Two Distance-Bounding Protocols
In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. Namely, we show that the Hitomi protocol is susceptible to a full secret key disclosure attack which not only results in violating the privacy of the protocol but also can be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2018
ISSN: 1536-1233
DOI: 10.1109/tmc.2017.2771769