نتایج جستجو برای: distance bounding protocol

تعداد نتایج: 489170  

Journal: :Comput. J. 2013
Aikaterini Mitrokotsa Pedro Peris-Lopez Christos Dimitrakakis Serge Vaudenay

Distance-bounding protocols form a family of challenge–response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the ver...

2016
Ben London Ofer Meshi Adrian Weller

In structured prediction, a predictor optimizes an objective function over a combinatorial search space, such as the set of all image segmentations, or the set of all part-of-speech taggings. Unfortunately, finding the optimal structured labeling—sometimes referred to as maximum a posteriori (MAP) inference—is, in general, NP-hard [12], due to the combinatorial structure of the problem. Many in...

2012
P. Sandeep Reddy Sridhar Reddy

Clustering is one of the important aspect in data mining. Clustering means similar group of objects. VA-file is a technique to combat the curse of dimensionality and hence necessarily ignores dependencies across dimensions. Existing methods to prune irrelevant clusters are based on bounding hyper spheres or bounding rectangles, whose lack of tightness compromises their efficiency in exact neare...

Journal: :CoRR 2013
Hadi Ahmadi Reihaneh Safavi-Naini

We consider the problem of distance bounding verification (DBV), where a proving party claims a distance and a verifying party ensures that the prover is within the claimed distance. Current approaches to “secure” distance estimation use signal’s time of flight, which requires the verifier to have an accurate clock. We study secure DBV using physical channel properties as an alternative to time...

Journal: :CoRR 2017
Ning Xu Brian L. Price Scott Cohen Jimei Yang Thomas S. Huang

Most previous bounding-box-based segmentation methods assume the bounding box tightly covers the object of interest. However it is common that a rectangle input could be too large or too small. In this paper, we propose a novel segmentation approach that uses a rectangle as a soft constraint by transforming it into an Euclidean distance map. A convolutional encoder-decoder network is trained en...

2005
Murat Ekinci Eyüp Gedikli Vasif Nabiyev

This paper presents a novel approach is described for realtime human/vehicle classification and motion analysis in real visual surveillance scene. Spatio-temporal 1-D signals based on the distances between the outer contour of binarized silhouette of a motion object and a bounding box placed around the silhouette are chosen as the basic image features called the distance vectors. The spatio-tem...

2005
Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux

We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any authenticated information about each other (e.g., public keys, certificates, passwords, shared keys,...

Journal: :Electronic Notes in Discrete Mathematics 2001
Alexei E. Ashikhmin Alexander Barg Simon Litsyn

We consider the problem of bounding the distance distribution for unrestricted block codes with known distance and/or dual distance. Applying the polynomial method, we provide a general framework for previously known results. We derive several upper and lower bounds both for finite length and for sequences of codes of growing length. Asymptotic results in the paper improve previously known esti...

2017
Iakovos Gurulian Gerhard P. Hancke Konstantinos Markantonakis Raja Naeem Akram

Relay attacks pose a significant threat against communicating devices that are required to operate within a short-distance from each other and a restricted time frame. In the field of smart cards, distance bounding protocols have been proposed as an effective countermeasure, whereas, in the field of smartphones, many proposals suggest the use of (natural) ambient sensing as an effective alterna...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید