-
1Dissertation/ Thesis
المؤلفون: Trujillo Rasúa, Rolando
المساهمون: University/Department: Universitat Rovira i Virgili. Departament d'Enginyeria Informàtica i Matemàtiques
Thesis Advisors: Solanas Gómez, Agustí, Domingo-Ferrer, Josep, 1965-
المصدر: T.1212-2012
TDX (Tesis Doctorals en Xarxa)مصطلحات موضوعية: RFID, Privacy, Security, Scalability, Trajectory anonymization, Distance-bounding protocols, Spatio-temporal data
وصف الملف: application/pdf
URL الوصول: http://hdl.handle.net/10803/86942
-
2Academic Journal
المؤلفون: Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG
المصدر: Tongxin xuebao, Vol 43, Pp 121-133 (2022)
مصطلحات موضوعية: distance-bounding protocol, location authentication, crowdsensing, collusion attack, reputation incentive, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
3Conference
المؤلفون: Christian Peeters, Tyler Tucker, Anushri Jain, Kevin Butler, Patrick Traynor
المصدر: MobiSys, The ACM International Conference on Mobile Systems, Applications, and Services, Helsinki, Finland, 18-22 June 2023
مصطلحات موضوعية: audio rogue base stations, cellular networks, cellular security, distance bounding
Relation: https://doi.org/10.1145/3581791.3596846; https://doi.org/10.5281/zenodo.7933109; https://doi.org/10.5281/zenodo.7933110; oai:zenodo.org:7933110
-
4Academic Journal
المؤلفون: Atta Badii, Gert-Jan van Schaik, Alper Kanak, İbrahim Arif, Salih Ergün, Niyazi Uğur, Sercan Tanrıseven
المصدر: Open Research Europe, Vol 3 (2023)
مصطلحات موضوعية: hardware-based security, authentication, Internet of Things, X-as-a-Service, secure distance bounding, cryptography, eng, Science, Social Sciences
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: GIL PONS, Reynaldo, MAUW, Sjouke, Trujillo-Rasua, Rolando
المصدر: Computer Communications, 210, 69 - 78 (2023-10)
مصطلحات موضوعية: Distance fraud, Mafia fraud, Security, Distance-bounding protocols, Relay attack, Security protocols, Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Relation: urn:issn:0140-3664; https://orbilu.uni.lu/handle/10993/60068; info:hdl:10993/60068; wos:001058646800001
-
6Academic Journal
المؤلفون: Akand, Mamunur, Safavi-Naini, Reihaneh, Kneppers, Marc, Giraud, Matthieu, Lafourcade, Pascal
المساهمون: University of Calgary, Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS), Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE)-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne), Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA)
المصدر: ISSN: 1545-5971 ; IEEE Transactions on Dependable and Secure Computing ; https://hal.science/hal-04403596 ; IEEE Transactions on Dependable and Secure Computing, 2023, 20 (1), pp.131-146. ⟨10.1109/TDSC.2021.3128073⟩.
مصطلحات موضوعية: Proof-of-Location, Distance bounding, Geo-tampering, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: hal-04403596; https://hal.science/hal-04403596; https://hal.science/hal-04403596/document; https://hal.science/hal-04403596/file/ASKGL21.pdf
-
7Book
المؤلفون: Fröschle, Sibylle B., Kubisch, Martin
مصطلحات موضوعية: Cyber-Physical Systems | NFC | Key Establishment | Distance Bounding | Formal Models and Verification | High Assurance | Resilience, 0: Computer Science, Information and General Works::005: Computer Programming, Programs, Data and Security
Relation: 6th Workshop on CPS&IoT Security and Privacy, CPSIoTSec 2024; Proceedings of the 6th Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2024); https://hdl.handle.net/11420/49032
الاتاحة: https://hdl.handle.net/11420/49032
-
8Academic Journal
المؤلفون: Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré
المصدر: Cryptography; Volume 6; Issue 4; Pages: 52
مصطلحات موضوعية: hijacking, distance-bounding, protocol
وصف الملف: application/pdf
-
9Conference
المؤلفون: Boureanu, Ioana, Drăgan, Constantin Cătălin, Dupressoir, François, Gérault, David, Lafourcade, Pascal
المساهمون: University of Surrey (UNIS), University of Bristol Bristol, Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS), Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE)-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne), Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA), ANR-16-IDEX-0001,CAP 20-25,CAP 20-25(2016), ANR-18-CE39-0007,DeCrypt,Langage Déclaratif pour la cryptographie symétrique(2018), ANR-18-CE39-0019,MobiS5,La sécurité et la privacy dans les réseaux 5G(2018), ANR-20-CE39-0005,PRIVABIO,Vers des systèmes de reconnaissance biométrique respectueux de la vie privée(2020)
المصدر: IEEE Computer Security Foundations Symposium (was CSFW) ; https://uca.hal.science/hal-04402795 ; IEEE Computer Security Foundations Symposium (was CSFW), 2021, Dubrovnik, Croatia. pp.1-16, ⟨10.1109/CSF51468.2021.00049⟩
مصطلحات موضوعية: Protocols, Systematics, Computational modeling, Encoding, Cryptography, Relays, Computer security, distance-bounding, security-formalism, mechanised-proof, easycrypt, [INFO]Computer Science [cs], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
10Academic Journal
المؤلفون: Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
مصطلحات موضوعية: Distance Bounding, Relay Attacks, Narrow-Band Ranging, Phase-based Ranging, Time of Flight, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
11Academic Journal
المساهمون: Comunidad de Madrid, European Commission
مصطلحات موضوعية: vehicular cloud computing, authentication, elliptic curve based cryptography, security analysis, tag/reader impersonation, distance bounding attacks, Informática
Relation: Comunidad de Madrid. P2018/TCAS-4566; Safkhani, M., Camara, C., Peris López, P., Bagheri, N. (2021). RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicular Communications, 28, 100311; http://hdl.handle.net/10016/39199; https://doi.org/10.1016/j.vehcom.2020.100311; 14; Vehicular Communications; 28; AR/0000027219
-
12Academic Journal
المؤلفون: Paschou, Chrysa, Johnson, Oliver T, Doufexi, Angela, Zhu, Ziming
المصدر: Paschou , C , Johnson , O T , Doufexi , A & Zhu , Z 2021 , A Lightweight protocol for validating proximity in UHF RFID systems . in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) . IEEE Vehicular Technology Conference , vol. 2021-September , Institute of Electrical and Electronics Engineers (IEEE) , 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) , OK , United States , 27/09/21 . https://doi.org/10.1109/VTC2021-Fall52928.2021.9625484
مصطلحات موضوعية: Physical Layer Security, Channel Correlation, Backscattering modulation, Channel propagation, Distance bounding, Distance Fraud, RFID systems
وصف الملف: application/pdf
الاتاحة: https://hdl.handle.net/1983/8457575e-6653-45ae-b60a-2265cc64e4e1
https://research-information.bris.ac.uk/en/publications/8457575e-6653-45ae-b60a-2265cc64e4e1
https://doi.org/10.1109/VTC2021-Fall52928.2021.9625484
https://research-information.bris.ac.uk/ws/files/306001373/ValidatingProximityRFID.pdf -
13Academic Journal
المؤلفون: Abidin, Aysajan, El Soussi, Mohieddine, Romme, Jac, Boer, Pepijn, Singelée, Dave, Bachmann, Christian
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2021, Issue 2; 106-135 ; 2569-2925
مصطلحات موضوعية: Distance Bounding, Relay Attacks, Narrow-Band Ranging, Phase-based Ranging, Time of Flight
وصف الملف: application/pdf
-
14Academic Journal
المساهمون: Universidad Carlos III de Madrid, Department of Computer Science, Professorship Aura Tuomas, Aalto-yliopisto, Aalto University
مصطلحات موضوعية: Cybersecurity, Distance Bounding, E-health, Implantable Medical Devices (IMDs), Remote Access
وصف الملف: application/pdf
Relation: IEEE Transactions on Emerging Topics in Computing; Camara , C , Peris-Lopez , P , De Fuentes , J M & Marchal , S 2021 , ' Access Control for Implantable Medical Devices ' , IEEE Transactions on Emerging Topics in Computing , vol. 9 , no. 3 , pp. 1126-1138 . https://doi.org/10.1109/TETC.2020.2982461; PURE UUID: ea362a3e-e46f-404c-a97c-fb79ff1c71e7; PURE ITEMURL: https://research.aalto.fi/en/publications/ea362a3e-e46f-404c-a97c-fb79ff1c71e7; PURE LINK: http://www.scopus.com/inward/record.url?scp=85082037348&partnerID=8YFLogxK; PURE FILEURL: https://research.aalto.fi/files/55556720/SCI_Marchal_Access_Control.09044351_1_.pdf; https://aaltodoc.aalto.fi/handle/123456789/102612; URN:NBN:fi:aalto-202102021914
-
15Conference
المؤلفون: Debant, Alexandre, Delaune, Stéphanie
المساهمون: EMbedded SEcurity and Cryptography (EMSEC), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Centre National de la Recherche Scientifique (CNRS), Université de Rennes (UR), European Project: 714955,H2020,ERC-2016-STG,ERC-POPSTAR(2017)
المصدر: Principles of Security and Trust - 8th International Conference ; https://hal.inria.fr/hal-02018280 ; Principles of Security and Trust - 8th International Conference, Apr 2019, Prague, Czech Republic
مصطلحات موضوعية: Distance bounding protocols, verification, symbolic model, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Prague, Czech Republic
Relation: info:eu-repo/grantAgreement//714955/EU/Reasoning about Physical properties Of security Protocols with an Application To contactless Systems/ERC-POPSTAR; hal-02018280; https://hal.inria.fr/hal-02018280; https://hal.inria.fr/hal-02018280/document; https://hal.inria.fr/hal-02018280/file/main.pdf
-
16Conference
المؤلفون: Debant, Alexandre, Delaune, Stéphanie, Wiedling, Cyrille
المساهمون: EMbedded SEcurity and Cryptography (EMSEC), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Centre National de la Recherche Scientifique (CNRS), Université de Rennes (UR), DGA Maîtrise de l'information (DGA.MI), Direction générale de l'Armement (DGA), ERC POPSTAR, European Project: 714955,H2020,ERC-2016-STG,POPSTAR(2017)
المصدر: Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security ; https://hal.inria.fr/hal-02171218 ; Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
مصطلحات موضوعية: distance bounding protocol, symbolic models, verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Luxembourg
Relation: info:eu-repo/grantAgreement//714955/EU/Reasoning about Physical properties Of security Protocols with an Application To contactless Systems/POPSTAR; hal-02171218; https://hal.inria.fr/hal-02171218; https://hal.inria.fr/hal-02171218/document; https://hal.inria.fr/hal-02171218/file/main.pdf
-
17Academic Journal
المساهمون: Conti, M., Lal, C.
مصطلحات موضوعية: Context-aware, Distance bounding, Proximity detection, Relay attack, RFID, Sensor modalitie, Zero-interaction authentication
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000501392500030; volume:88; firstpage:101652; journal:COMPUTERS & SECURITY; http://hdl.handle.net/11577/3330752; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85074143816; https://www.journals.elsevier.com/computers-and-security
-
18Academic Journal
المؤلفون: ZHUANG, Yunhui, YANG, Anjia, HANCKE, Gerhard, WONG, Duncan S., YANG, Guomin
المصدر: Research Collection School Of Computing and Information Systems
مصطلحات موضوعية: Distance bounding, embedded hardware, RFID security, Information Security
وصف الملف: application/pdf
Relation: https://ink.library.smu.edu.sg/sis_research/7296; https://ink.library.smu.edu.sg/context/sis_research/article/8299/viewcontent/08067522.pdf
-
19Academic Journal
المؤلفون: Nam-Su Jho, Taek-Young Youn
المصدر: Sustainability; Volume 12; Issue 24; Pages: 10330
مصطلحات موضوعية: location proof, distance bounding protocol, authentication, dynamic membership management, privacy
جغرافية الموضوع: agris
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/su122410330
الاتاحة: https://doi.org/10.3390/su122410330
-
20Academic Journal
المؤلفون: Aysajan Abidin
المصدر: Cryptography; Volume 4; Issue 2; Pages: 14
مصطلحات موضوعية: relay attack, distance bounding, RFID systems, quantum communication, quantum cryptography
وصف الملف: application/pdf