2014
DOI: 10.1007/s10660-014-9167-y
|View full text |Cite
|
Sign up to set email alerts
|

All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
“…This kind of attacks is first introduced in [8]. By using the idea of [8], we improve some attacks on DF on [42,36,7,50,34,38,51,22,20,21] and one on MiM on [56]. We detail only one attack on DF and the one on MiM, but for the other protocols we give the PRF construction to mount a successful attack.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…,Han et al (2016),Martinez-Pelaez et al (2015) andShi et al (2013). Factor 5 focused on mobile payment services protocol Falahati and Jannati (2015),. Issac and Zeadally (2014),Lee et al (2008),Li et al (2012) and Janav et al(2014)based on protocols of mobile payment works, therefore, factor 5 was labelled as mobile payment services application.…”
mentioning
confidence: 99%