设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
SpringerLink电子期刊(25)
Elsevier电子期刊(6)
在“
SpringerLink电子期刊
”中,
命中:
25
条,耗时:小于0.01 秒
在所有数据库中总计命中:
31
条
1.
Survey of Distance Bounding Protocols and Threats
关键词:
Distance bounding
;
Threat models
;
Mafia
fraud
;
Terrorist
fraud
;
Distance
fraud
;
RFID
;
NFC
;
Relay attack
;
Collusion
fraud
刊名:Lecture Notes in Computer Science
出版年:2016
2.
Distance Bounding Protocol for RFID Systems
关键词:
RFID
;
Distance bounding protocol
;
Relay attack
;
Terrorist
fraud
attack
刊名:Lecture Notes in Computer Science
出版年:2016
3.
Efficient Public-Key Distance Bounding Protocol
关键词:
Distance bounding
;
RFID
;
NFC
;
Relay attack
;
Key agreement
;
Mafia
fraud
;
Distance
fraud
;
Distance hijacking
刊名:Lecture Notes in Computer Science
出版年:2016
4.
All-or-nothing approach to protect a distance bounding protocol against terrorist
fraud
attack for low-cost devices
作者:
Abolfazl Falahati (1)
Hoda Jannati (1)
1. Department of Electrical Engineering (DCCS Lab)
;
Iran University of Science and Technology
;
Tehran
;
Iran
关键词:
Distance bounding protocol
;
Distance
fraud
attack
;
Mafia
fraud
attack
;
Relay attack
;
Terrorist
fraud
attack
;
Wormhole attack
刊名:Electronic Commerce Research
出版年:2015
5.
Achieving an appropriate security level for distance bounding protocols over a noisy channel
作者:
Hoda Jannati
;
Abolfazl Falahati
关键词:
Distance bounding protocol
;
Distance
fraud
attack
;
Mafia
fraud
attack
;
Radio frequency identification
;
Relay attack
刊名:Telecommunication Systems
出版年:2015
6.
Tap-Tap and Pay (TTP): Preventing the
Mafia
Attack in NFC Payment
关键词:
Near Field Communication
;
Mobile NFC payment
;
Mafia
attack
;
MITM attack
;
Mobile sensor
;
Accelerometer
;
Security
;
Usability
刊名:Lecture Notes in Computer Science
出版年:2015
7.
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
作者:
Hoda Jannati
;
Abolfazl Falahati
关键词:
Distance bounding protocol
;
Impersonation attack
;
Mafia
fraud
attack
;
Relay attack
;
RFID search protocol
刊名:Wireless Personal Communications
出版年:2015
8.
Practical and Provably Secure Distance-Bounding
刊名:Lecture Notes in Computer Science
出版年:2015
9.
Optimal Proximity Proofs
刊名:Lecture Notes in Computer Science
出版年:2015
10.
Optimal Proximity Proofs Revisited
刊名:Lecture Notes in Computer Science
出版年:2015
1
2
3
按检索点细分(25)
关键词(10)
文摘(21)
按出版年细分(25)
2016年(3)
2015年(7)
2014年(1)
2013年(1)
2012年(4)
2010年(2)
2009年(5)
2007年(2)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.