Emerging terahertz integrated systems in silicon
Silicon-based terahertz (THz) integrated circuits (ICs) have made rapid progress over the
past decade. The demonstrated basic component performance, as well as the maturity of …
past decade. The demonstrated basic component performance, as well as the maturity of …
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
Distance-bounding protocols have been introduced to thwart relay attacks against
contactless authentication protocols. In this context, verifiers have to authenticate the …
contactless authentication protocols. In this context, verifiers have to authenticate the …
CMOS THz-ID: A 1.6-mm² package-less identification tag using asymmetric cryptography and 260-GHz far-field backscatter communication
This article presents an ultra-small, high-security identification tag that is entirely built in a
CMOS chip without external components. The usage of backscatter communications at 260 …
CMOS chip without external components. The usage of backscatter communications at 260 …
Towards secure distance bounding
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against
many access control and payment schemes. In this work, we present distance-bounding …
many access control and payment schemes. In this work, we present distance-bounding …
Beyond crypto: Physical-layer security for Internet of Things devices
The boom of connected Internet of Things (IoT) nodes and ubiquity of wireless
communications are projected to increase wireless data traffic by several orders of …
communications are projected to increase wireless data traffic by several orders of …
A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things
A mobile ad-hoc network (MANET) is a group of low power computing mobile and wireless
devices which cooperatively form an infrastructure-less and decentralised network. Scarcity …
devices which cooperatively form an infrastructure-less and decentralised network. Scarcity …
Survey of distance bounding protocols and threats
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …
technologies allow a tag to communicate without contact with a reader. In wireless …
{NFCGate}: Opening the Door for {NFC} Security Research with a {Smartphone-Based} Toolkit
Near Field Communication (NFC) is being used in a variety of security-critical applications,
from access control to payment systems. However, NFC protocol analysis typically requires …
from access control to payment systems. However, NFC protocol analysis typically requires …
Prover anonymous and deniable distance-bounding authentication
In distance-bounding authentication protocols, a verifier assesses that a prover is (1)
legitimate and (2) in the verifier's proximity. Proximity checking is done by running time …
legitimate and (2) in the verifier's proximity. Proximity checking is done by running time …
Challenges in distance bounding
Smartcard-based protocols represent an increasingly large share of the wireless
authentication market, from contactless payments to remote car unlocking. Unfortunately …
authentication market, from contactless payments to remote car unlocking. Unfortunately …