ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards
Communications and Networking - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
◽
10.1007/978-3-319-78139-6_32
◽
2018
◽
pp. 312-322
Author(s):
Zhenjiang Dong
◽
Xinluo Wang
◽
Miao Lei
◽
Wei Wang
◽
Hui Li
Keyword(s):
Distance Bounding Protocol
Download Full-text
Related Documents
Cited By
References
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17
◽
10.1145/3052973.3053000
◽
2017
◽
Cited By ~ 14
Author(s):
Gildas Avoine
◽
Xavier Bultel
◽
Sébastien Gambs
◽
David Gérault
◽
Pascal Lafourcade
◽
...
Keyword(s):
Distance Bounding Protocol
Download Full-text
A mafia and distance fraud high-resistance RFID distance bounding protocol
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994024
◽
2014
◽
Cited By ~ 2
Author(s):
Rahim Entezari
◽
Hossein Bahramgiri
◽
Mahnaz Tajamolian
Keyword(s):
High Resistance
◽
Distance Bounding Protocol
Download Full-text
Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System
International Journal of UbiComp
◽
10.5121/iju.2011.2305
◽
2011
◽
Vol 2
(3)
◽
pp. 69-82
Author(s):
Mohammad Arjmand
◽
Mahmoud Gardeshi
◽
Reza Taheri zohur
◽
Mohammad Kazemi
Keyword(s):
Electronic Voting
◽
Voting System
◽
Distance Bounding Protocol
◽
Electronic Voting System
Download Full-text
The Poulidor Distance-Bounding Protocol
Radio Frequency Identification: Security and Privacy Issues - Lecture Notes in Computer Science
◽
10.1007/978-3-642-16822-2_19
◽
2010
◽
pp. 239-257
◽
Cited By ~ 17
Author(s):
Rolando Trujillo-Rasua
◽
Benjamin Martin
◽
Gildas Avoine
Keyword(s):
Distance Bounding Protocol
Download Full-text
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation
Network and System Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-38631-2_33
◽
2013
◽
pp. 451-464
◽
Cited By ~ 8
Author(s):
Yunhui Zhuang
◽
Anjia Yang
◽
Duncan S. Wong
◽
Guomin Yang
◽
Qi Xie
Keyword(s):
Real Time
◽
Highly Efficient
◽
Distance Bounding Protocol
Download Full-text
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications
Journal of Computer Science and Technology
◽
10.1007/s11390-020-0260-5
◽
2020
◽
Vol 35
(4)
◽
pp. 825-842
Author(s):
Zachary P. Languell
◽
Qijun Gu
Keyword(s):
Unmanned Aerial Vehicle
◽
Aerial Vehicle
◽
Distance Bounding Protocol
◽
Point Distance
Download Full-text
An Efficient RFID Distance Bounding Protocol
Advances in Intelligent Systems and Computing - International Joint Conference
◽
10.1007/978-3-319-19713-5_31
◽
2015
◽
pp. 367-376
◽
Cited By ~ 2
Author(s):
Li Zhai
◽
ChuanKun Wu
Keyword(s):
Distance Bounding Protocol
Download Full-text
Mafia fraud attack against the RČ Distance-Bounding Protocol
2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)
◽
10.1109/rfid-ta.2012.6404571
◽
2012
◽
Cited By ~ 8
Author(s):
Aikaterini Mitrokotsa
◽
Cristina Onete
◽
Serge Vaudenay
Keyword(s):
Distance Bounding Protocol
◽
Mafia Fraud Attack
Download Full-text
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-34129-8_25
◽
2012
◽
pp. 285-292
◽
Cited By ~ 9
Author(s):
Anjia Yang
◽
Yunhui Zhuang
◽
Duncan S. Wong
Keyword(s):
Slow Phase
◽
Distance Bounding Protocol
Download Full-text
Robust RFID Distance-Bounding Protocol based on Mutual Authentication
The Journal of Korean Institute of Information Technology
◽
10.14801/kiitr.2013.11.7.47
◽
2013
◽
Vol 11
(7)
◽
Cited By ~ 1
Author(s):
Hae-Soon Ahn
Keyword(s):
Mutual Authentication
◽
Distance Bounding Protocol
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close