搜索结果: 1-5 共查到“军队指挥学 Distance Bounding Protocol”相关记录5条 . 查询时间(0.079 秒)
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
distance-bounding terrorist-fraud anonymous authentication
2017/4/11
Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted prov...
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
cryptographic protocols grouping-proof distance-bounding
2017/2/20
In the recent IEEE communication letter ``Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close" by Karlsson and Mitrokotsa, a protocol for grouping-proof distance-bounding (GPDB) is...
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
RFID Distance Bounding Protocol PUF Security Terrorist fraud
2011/2/23
Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols a...
RFID distance bounding protocol with mixed challenges to prevent relay attacks
RFID authentication distance bounding protocol
2009/7/14
RFID systems suffer from different location-based attacks such as distance fraud,
mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious
since this attack can be ...
Yet Another Secure Distance-Bounding Protocol
Distance-Bounding protocols Relay Attacks Mafia-Fraud
2009/6/5
Distance-bounding protocols have been proposed by Brands and Chaum in
1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has
been introduced fifteen years ago, only ...