Open AccessProceedings Article
Distance-Bounding Protocols (Extended Abstract).
Stefan A. Brands,David Chaum +1 more
- pp 344-359
About:
This article is published in Theory and Application of Cryptographic Techniques.The article was published on 1993-01-01 and is currently open access. It has received 525 citations till now. The article focuses on the topics: Distance-bounding protocol & Bounding overwatch.read more
Citations
More filters
Proceedings ArticleDOI
Packet leashes: a defense against wormhole attacks in wireless networks
TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Journal ArticleDOI
The security and privacy of smart vehicles
TL;DR: Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology, but this evolution has deep implications for security and privacy, which the research community has overlooked so far.
Proceedings ArticleDOI
Rushing attacks and defense in wireless ad hoc network routing protocols
TL;DR: The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols.
Proceedings ArticleDOI
Secure verification of location claims
TL;DR: The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices.
Proceedings ArticleDOI
Detecting and correcting malicious data in VANETs
TL;DR: A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
References
More filters
Book ChapterDOI
How to prove yourself: practical solutions to identification and signature problems
Amos Fiat,Adi Shamir +1 more
TL;DR: Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Book ChapterDOI
Wallet Databases with Observers
David Chaum,Torben P. Pedersen +1 more
TL;DR: This article argues that a particular combination of these two kinds of mechanism can overcome the limitations of each alone, providing both security and correctness for organizations as well as privacy and even anonymity for individuals.
Journal ArticleDOI
Minimum disclosure proofs of knowledge
TL;DR: In this article, the authors present protocols for allowing a "prover" to convince a "verifier" that the prover knows some verifiable secret information, without allowing the verifier to learn anything about the secret.
Book ChapterDOI
The Prisoners’ Problem and the Subliminal Channel
TL;DR: Two accomplices in a crime have been arrested and are about to be locked in widely separated cells and their only means of communication after they are locked up will he by way of messages conveyed for them by trustees -- who are known to be agents of the warden.
Book ChapterDOI
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
TL;DR: A variant is proposed which is proven to be as secuie as the difficulty of solving both the discrete logarithm problem and the specific factoring problem simultaneously simultaneously and some other variants such as an identity-based variant and an elliptic curve variant are also proposed.