Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, JS[Kim, Jin Seok] | ko |
dc.contributor.author | Cho, K[Cho, Kookrae] | ko |
dc.contributor.author | Yum, DH[Yum, Dae Hyun] | ko |
dc.contributor.author | Hong, SJ[Hong, Sung Je] | ko |
dc.contributor.author | Lee, PJ[Lee, Pil Joong] | ko |
dc.date.available | 2017-07-11T06:55:55Z | - |
dc.date.created | 2017-04-10 | - |
dc.date.issued | 2012-04 | - |
dc.identifier.citation | IEICE Transactions on Information and Systems, v.E95D, no.4, pp.1155 - 1158 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/3373 | - |
dc.description.abstract | Traditional authentication protocols are based on crypto graphic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the dis tance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack. Copyright © 2012 The Institute of Electronics, Information and Communication Engineers. | - |
dc.publisher | institute of Electronics, Information and Communication Engineers | - |
dc.subject | Authentication | - |
dc.subject | Authentication Protocols | - |
dc.subject | Computer Crime | - |
dc.subject | Crime | - |
dc.subject | Cryptographic Techniques | - |
dc.subject | Distance Bounding | - |
dc.subject | Distance Hounding Protocol | - |
dc.subject | False Acceptance Rate | - |
dc.subject | Graphic Techniques | - |
dc.subject | Identity Verification | - |
dc.subject | Mafia Fraud Attack | - |
dc.subject | Relay Attack | - |
dc.subject | Security | - |
dc.title | Lightweight Distance Bounding Protocol against Relay Attacks | - |
dc.type | Article | - |
dc.identifier.doi | 10.1587/transinf.E95.D.1155 | - |
dc.identifier.wosid | 000302834400026 | - |
dc.identifier.scopusid | 2-s2.0-84859369602 | - |
dc.type.local | Article(Overseas) | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.contributor.nonIdAuthor | Kim, JS[Kim, Jin Seok] | - |
dc.contributor.nonIdAuthor | Yum, DH[Yum, Dae Hyun] | - |
dc.contributor.nonIdAuthor | Hong, SJ[Hong, Sung Je] | - |
dc.contributor.nonIdAuthor | Lee, PJ[Lee, Pil Joong] | - |
dc.identifier.citationVolume | E95D | - |
dc.identifier.citationNumber | 4 | - |
dc.identifier.citationStartPage | 1155 | - |
dc.identifier.citationEndPage | 1158 | - |
dc.identifier.citationTitle | IEICE Transactions on Information and Systems | - |
dc.type.journalArticle | Article | - |
dc.contributor.affiliatedAuthor | Cho, K[Cho, Kookrae] | - |
There are no files associated with this item.