Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Kim, JS[Kim, Jin Seok] ko
dc.contributor.author Cho, K[Cho, Kookrae] ko
dc.contributor.author Yum, DH[Yum, Dae Hyun] ko
dc.contributor.author Hong, SJ[Hong, Sung Je] ko
dc.contributor.author Lee, PJ[Lee, Pil Joong] ko
dc.date.available 2017-07-11T06:55:55Z -
dc.date.created 2017-04-10 -
dc.date.issued 2012-04 -
dc.identifier.citation IEICE Transactions on Information and Systems, v.E95D, no.4, pp.1155 - 1158 -
dc.identifier.issn 0916-8532 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/3373 -
dc.description.abstract Traditional authentication protocols are based on crypto graphic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the dis tance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack. Copyright © 2012 The Institute of Electronics, Information and Communication Engineers. -
dc.publisher institute of Electronics, Information and Communication Engineers -
dc.subject Authentication -
dc.subject Authentication Protocols -
dc.subject Computer Crime -
dc.subject Crime -
dc.subject Cryptographic Techniques -
dc.subject Distance Bounding -
dc.subject Distance Hounding Protocol -
dc.subject False Acceptance Rate -
dc.subject Graphic Techniques -
dc.subject Identity Verification -
dc.subject Mafia Fraud Attack -
dc.subject Relay Attack -
dc.subject Security -
dc.title Lightweight Distance Bounding Protocol against Relay Attacks -
dc.type Article -
dc.identifier.doi 10.1587/transinf.E95.D.1155 -
dc.identifier.wosid 000302834400026 -
dc.identifier.scopusid 2-s2.0-84859369602 -
dc.type.local Article(Overseas) -
dc.type.rims ART -
dc.description.journalClass 1 -
dc.contributor.nonIdAuthor Kim, JS[Kim, Jin Seok] -
dc.contributor.nonIdAuthor Yum, DH[Yum, Dae Hyun] -
dc.contributor.nonIdAuthor Hong, SJ[Hong, Sung Je] -
dc.contributor.nonIdAuthor Lee, PJ[Lee, Pil Joong] -
dc.identifier.citationVolume E95D -
dc.identifier.citationNumber 4 -
dc.identifier.citationStartPage 1155 -
dc.identifier.citationEndPage 1158 -
dc.identifier.citationTitle IEICE Transactions on Information and Systems -
dc.type.journalArticle Article -
dc.contributor.affiliatedAuthor Cho, K[Cho, Kookrae] -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Companion Diagnostics and Medical Technology Research Group 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE