搜索结果: 1-3 共查到“密码学 distance-bounding protocols”相关记录3条 . 查询时间(0.062 秒)
Rational distance-bounding protocols over noisy channels
cryptographic protocols / distance-bounding protocols RFID protocols game theory
2012/3/26
We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels in a distance-bounding ...
Distance Hijacking Attacks on Distance Bounding Protocols
applications / Distance bounding location verification position verification attacks, hijacking multi-prover environment
2012/3/29
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on dista...
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols(eprint version)
Authentication Distance bounding Proximity check
2009/11/18
Many distance bounding protocols appropriate for RFID technology have been proposed
recently. However, the design and the analysis of these protocols are not based on a formal
perspective. Motivated...