Distance bounding protocols aim at avoiding relay attacks during an authentication process. Such protocols are especially important in RFID, where mounting a relay attack between a low-capability prover and a remote verifier is a realistic threat. Several distance bounding protocols suitable for RFID have been recently suggested, all of which aim to reduce the adversary's success probability and the number of rounds executed within the protocol. Peinado et al. introduced an efficient distance bounding protocol that uses the concept of void challenges. We present in this paper a generic technique called MUltiState Enhancement that is based on a more efficient use of void challenges. MUSE significantly improves the performances of the already...
The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an ...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and te...
Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close ...
Relay attacks pose a serious threat to the security of radio frequency identification systems. The a...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
Relay attacks are one of the most challenging threats RFID will have to face in the close future. Th...
Distance-bounding protocols aim at impeding man-in-themiddle( MITM) attacks by measuring response ti...
This Radio Frequency Identification (RFID) systems suffer from different security and privacy proble...
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Un...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and t...
International audienceMany distance bounding protocols appropriate for the RFID technology have been...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an ...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and te...
Abstract. Relay attacks are one of the most challenging threats RFID will have to face in the close ...
Relay attacks pose a serious threat to the security of radio frequency identification systems. The a...
A distance bounding protocol enables one entity to determine an upper bound on the physical distance...
Relay attacks are one of the most challenging threats RFID will have to face in the close future. Th...
Distance-bounding protocols aim at impeding man-in-themiddle( MITM) attacks by measuring response ti...
This Radio Frequency Identification (RFID) systems suffer from different security and privacy proble...
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Un...
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and t...
International audienceMany distance bounding protocols appropriate for the RFID technology have been...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
Many distance bounding protocols appropriate for the RFID technology have been pro-posed recently. U...
The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an ...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...