Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The internet of things security: A survey encompassing unexplored areas and new insights
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …
life undertakings, mandates continuous research pursuits in IoT and its associated …
Security of distance-bounding: A survey
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate
whether the latter is located in his vicinity. These protocols are of particular interest in …
whether the latter is located in his vicinity. These protocols are of particular interest in …
Distance hijacking attacks on distance bounding protocols
After several years of theoretical research on distance bounding protocols, the first
implementations of such protocols have recently started to appear. These protocols are …
implementations of such protocols have recently started to appear. These protocols are …
Distance-bounding protocols: Verification without time and location
Distance-bounding protocols are cryptographic protocols that securely establish an upper
bound on the physical distance between the participants. Existing symbolic verification …
bound on the physical distance between the participants. Existing symbolic verification …
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa… - Journal of Computer …, 2015 - journals.sagepub.com
From contactless payments to remote car unlocking, many applications are vulnerable to
relay attacks. Distance bounding protocols are the main practical countermeasure against …
relay attacks. Distance bounding protocols are the main practical countermeasure against …
On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
UWB rapid-bit-exchange system for distance bounding
NO Tippenhauer, H Luecken, M Kuhn… - Proceedings of the 8th …, 2015 - dl.acm.org
Distance bounding protocols enable one device (the verifier) to securely establish an upper
bound on its distance to another device (the prover). These protocols can be used for secure …
bound on its distance to another device (the prover). These protocols can be used for secure …
A formal approach to distance-bounding RFID protocols
U Dürholz, M Fischlin, M Kasper, C Onete - International Conference on …, 2011 - Springer
Distance-bounding protocols aim at impeding man-in-themiddle (MITM) attacks by
measuring response times. Three kinds of attacks are usually addressed:(1) Mafia attacks …
measuring response times. Three kinds of attacks are usually addressed:(1) Mafia attacks …
A novel RFID distance bounding protocol based on physically unclonable functions
Abstract Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (ie,
mafia, terrorist and distance frauds) when they are used for authentication purposes …
mafia, terrorist and distance frauds) when they are used for authentication purposes …
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
Distance-bounding protocols have been introduced to thwart relay attacks against
contactless authentication protocols. In this context, verifiers have to authenticate the …
contactless authentication protocols. In this context, verifiers have to authenticate the …