How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Zero-knowledge proofs of identity
Journal of Cryptology
Divertible zero knowledge interactive proofs and commutative random self-reducibility
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
An interactive identification scheme based on discrete logarithms and factoring
Journal of Cryptology - Eurocrypt '90
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Identification Tokens - or: Solving the Chess Grandmaster Problem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Self-Escrowed Cash against User Blackmailing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure object identification: or: solving the Chess Grandmaster Problem
Proceedings of the 2003 workshop on New security paradigms
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Journal of the ACM (JACM)
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Proceedings of the 4th ACM workshop on Wireless security
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Protecting file systems with transient authentication
Wireless Networks
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Detecting relay attacks with timing-based protocols
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Protocols for RFID tag/reader authentication
Decision Support Systems
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Simple and effective defense against evil twin access points
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Keep your enemies close: distance bounding against smartcard relay attacks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Secure neighbor discovery in wireless networks: formal investigation of possibility
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
A system for secure verification of location claims
ACM SIGMOBILE Mobile Computing and Communications Review
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Deterministic Secure Positioning in Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Improved Security Notions and Protocols for Non-transferable Identification
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Bootstrapping trust in a "trusted" platform
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Hop chains: Secure routing and the establishment of distinct identities
Theoretical Computer Science
Secure and precise location verification using distance bounding and simultaneous multilateration
Proceedings of the second ACM conference on Wireless network security
The Swiss-Knife RFID Distance Bounding Protocol
Information Security and Cryptology --- ICISC 2008
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
ISC '09 Proceedings of the 12th International Conference on Information Security
Fair E-Cash: Be Compact, Spend Faster
ISC '09 Proceedings of the 12th International Conference on Information Security
Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Let's Get Physical: Models and Methods for Real-World Security Protocols
TPHOLs '09 Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
On the impact of localization data in wireless sensor networks with malicious nodes
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
RFID Distance Bounding Multistate Enhancement
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Proving your location without giving up your privacy
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
IEEE Communications Letters
Effectiveness of distance-decreasing attacks against impulse radio ranging
Proceedings of the third ACM conference on Wireless network security
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
Attacks on a distance bounding protocol
Computer Communications
The dark side of threshold cryptography
FC'02 Proceedings of the 6th international conference on Financial cryptography
Bilateration: an attack-resistant localization algorithm of wireless sensor network
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Secure verification of location claims with simultaneous distance modification
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Distance bounding in noisy environments
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Position statement in RFID S&P panel: from relative security to perceived secure
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Proceedings of the 13th international conference on Security protocols
ID-based secure distance bounding and localization
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Utilization of user feedback in indoor positioning system
Pervasive and Mobile Computing
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
ROSETTA: robust and secure mobile target tracking in a wireless ad hoc environment
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Optimal security limits of RFID distance bounding protocols
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
The Poulidor distance-bounding protocol
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Contextual biometric-based authentication for ubiquitous services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
A localization game in wireless sensor networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Design of a secure distance-bounding channel for RFID
Journal of Network and Computer Applications
Non-uniform stepping approach to RFID distance bounding problem
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
How secret-sharing can defeat terrorist fraud
Proceedings of the fourth ACM conference on Wireless network security
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Group distance bounding protocols
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Position-based quantum cryptography: impossibility and constructions
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Secure localization using dynamic verifiers
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
On the requirements for successful GPS spoofing attacks
Proceedings of the 18th ACM conference on Computer and communications security
How to tell if your cloud files are vulnerable to drive crashes
Proceedings of the 18th ACM conference on Computer and communications security
A formal approach to distance-bounding RFID protocols
ISC'11 Proceedings of the 14th international conference on Information security
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
A note on a privacy-preserving distance-bounding protocol
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Varying levels of RFID tag ownership in supply chains
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems
Hop chains: secure routing and the establishment of distinct identities
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Survey on location authentication protocols and spatial-temporal attestation services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
How to construct secure cryptographic location-based services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
One user, many hats; and, sometimes, no hat: towards a secure yet usable PDA
SP'04 Proceedings of the 12th international conference on Security Protocols
Secure location verification using radio broadcast
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
An open approach for designing secure electronic immobilizers
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Personal and Ubiquitous Computing
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Make noise and whisper: a solution to relay attacks
SP'11 Proceedings of the 19th international conference on Security Protocols
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A novel RFID distance bounding protocol based on physically unclonable functions
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Security analysis of two distance-bounding protocols
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Locanyms: towards privacy-preserving location-based services
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
AMORES: an architecture for mobiquitous resilient systems
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Simultaneous multi-level RFID tag ownership & transfer in health care environments
Decision Support Systems
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Subtle kinks in distance-bounding: an analysis of prominent protocols
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Efficient, secure, private distance bounding without key updates
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Terrorism in distance bounding: modeling terrorist-fraud resistance
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Eliminating rouge femtocells based on distance bounding protocol and geographic information
Expert Systems with Applications: An International Journal
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Decision Support Systems
Hi-index | 0.01 |
It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control computer in the building would like to be ensured that the person giving the responses is no more than a few meters away. The "distance bounding" technique we introduce solves this problem by timing the delay between sending out a challenge bit and receiving back the corresponding response bit. It can be integrated into common identification protocols. The technique can also be applied in the three-party setting of "wallets with observers" in such a way that the intermediary party can prevent the other two from exchanging information, or even developing common coinflips.