搜索结果: 1-7 共查到“军队指挥学 Relay Attacks”相关记录7条 . 查询时间(0.078 秒)
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
authentication protocol relay attacks side-channel attacks
2019/1/9
Relay attacks are nowadays well known and most designers of secure authentication protocols are aware of them. At present, the main methods to prevent these attacks are based on the so-called distance...
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
implementation cryptographic protocols
2010/7/14
In this work, we further propose simple countermeasures that minimize the risk of relay attacks and that can be immediately deployed by the car owners; however, these countermeasures also disable the ...
Relay Attacks on RFID-Based Electronic Voting Systems
Relay Attacks RFID-Based Electronic Voting Systems
2009/9/2
Many secure systems, such as contactless credit cards and
secure entrance systems, are built with contactless smartcard RFID tech-
nologies. In many cases these systems are claimed to be secure base...
RFID distance bounding protocol with mixed challenges to prevent relay attacks
RFID authentication distance bounding protocol
2009/7/14
RFID systems suffer from different location-based attacks such as distance fraud,
mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious
since this attack can be ...
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
authentication protocol proximity check relay attack
2009/6/9
Relay attacks are a major concern for RFID systems: during an authentication
process an adversary transparently relays messages between a verifier
and a remote legitimate prover.
We present an auth...
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
Picking Virtual Pockets Relay Attacks Contactless Smartcard Systems
2009/1/16
A contactless smartcard is a smartcard
that can communicate with other devices without
any physical connection, using Radio-Frequency
Identifier (RFID) technology. Contactless smartcards
are becom...
A Note on the Relay Attacks on e-passports The Case of Czech e-passports
RFID e-passport relay attack
2008/8/20
The threat of relay attacks on authentication protocols is
often well recognized, especially for contactless applications like RFID
chips. It is, therefore, a bit surprising to meet an implementatio...