搜索结果: 1-15 共查到“军队指挥学 distance-bounding”相关记录20条 . 查询时间(0.106 秒)
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats b...
Fine-Grained and Application-Ready Distance-Bounding Security
DB-security properties DB protocols
2018/5/2
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...
Anonymous Distance-Bounding Identification
Distance-Bounding Anonymous Authentication Public-Key
2018/4/19
Anonymous Distance-Bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound from them, without revealing their identity. This is an attractive property that ...
Directional Distance-Bounding Identification Protocols
Distance-Bounding Public-Key Authentication Directional Antenna
2018/4/19
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. A public key distance bounding relies on the public key of the users to prove their identi...
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
distance-bounding terrorist-fraud anonymous authentication
2017/4/11
Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted prov...
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
cryptographic protocols grouping-proof distance-bounding
2017/2/20
In the recent IEEE communication letter ``Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close" by Karlsson and Mitrokotsa, a protocol for grouping-proof distance-bounding (GPDB) is...
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides
a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions
(PUFs). We contradict th...
Prover Anonymous and Deniable Distance-Bounding Authentication
distance-bounding, deniability, anonymity
2016/1/25
In distance-bounding authentication protocols, a verifier confirms that a prover
is (1) legitimate and (2) in the verifier’s proximity. Proximity checking is done by
running time-critical exchanges ...
Relay attacks (and, more generally, man-in-the-middle attacks) are a
serious threat against many access control and payment schemes. In this work,
we present distance-bounding protocols, how these c...
Location Leakage in Distance Bounding: Why Location Privacy does not Work
relay attacks location privacy distance-bounding authentication
2014/3/5
In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guar...
Distance-bounding is a practical solution to be used in security-sensitive contexts, to prevent relay attacks. Its applied cryptographic role is definitely spreading fast and it is clearly far reachin...
Rational distance-bounding protocols over noisy channels
cryptographic protocols / distance-bounding protocols RFID protocols game theory
2012/3/26
We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels in a distance-bounding ...
Distance Hijacking Attacks on Distance Bounding Protocols
applications / Distance bounding location verification position verification attacks, hijacking multi-prover environment
2012/3/29
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on dista...
A Formal Approach to Distance-Bounding RFID Protocols
foundations / RFID distance-bounding protocols formal models provable security
2012/3/27
Distance-Bounding identification protocols aim at impeding man-in-the-middle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where...