نتایج جستجو برای: distance bounding protocol

تعداد نتایج: 489170  

2010
A. Mitrokotsa C. Dimitrakakis P. Peris-Lopez J. C. Hernandez-Castro

Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, maa fraud and terrorist fraud attacks. Reid et al. proposed the rst symmetric key distance bounding protocol against maa and terrorist fraud attacks [1]. However, [2] claims that this is only achieved with a (7/8) probability of success for maa fraud, rather than the theoretical value...

2002
MARK S. JOSHI JOCHEN THEIS

We develop a new method for finding upper bounds for Bermudan swaptions in a swap-rate market model. By comparing with lower bounds found by exercise boundary parametrization, we find that the bounds are well within bid-offer spread. As an application, we study the dependence of Bermudan swaption prices on the number of instantaneous factors used in the model. We also establish an equivalence w...

2015
Handan Kilinç Serge Vaudenay

Distance bounding protocols become important since wireless technologies become more and more common. Therefore, the security of the distance bounding protocol should be carefully analyzed. However, most of the protocols are not secure or their security is proven informally. Recently, Boureanu and Vaudenay defined the common structure which is commonly followed by most of the distance bounding ...

2009
Gildas Avoine Christian Floerkemeier Benjamin Martin

Distance bounding protocols aim at avoiding relay attacks during an authentication process. They are particularly awaited in RFID, where mounting a relay attack between a lowcapability prover and a remote verifier is no longer fiction. Several distance bounding protocols suited to RFID have been recently suggested, all targeting to reduce the two related quantities: adversary’s success probabil...

2014
Il-Soo Jeon Eun-Jun Yoon

Security and privacy of RFID systems have become very important issues along with their increasing applications. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication protocol(RAPLT) using merge and separation operations. Since their protocol uses very lightweight bitwise operations: XOR, merge, and separation operations, it will be suitable for the applications using low...

2008
Chong Hee Kim Gildas Avoine François Koeune François-Xavier Standaert Olivier Pereira

Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forwarding the signal between the verifier and an out-of-field prover. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short aut...

2016
Handan Kilinç Serge Vaudenay

Distance bounding protocols become more and more important because they are the most accurate solution to defeat relay attacks. They consist of two parties: a verifier and a prover. The prover shows that (s)he is close enough to the verifier. In some applications such as payment systems, using public-key distance bounding protocols is practical as no pre-shared secret is necessary between the p...

Journal: :The Journal of Korea Information and Communications Society 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید